Podcasts about technology nist

  • 180PODCASTS
  • 281EPISODES
  • 39mAVG DURATION
  • 1EPISODE EVERY OTHER WEEK
  • Dec 23, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about technology nist

Latest podcast episodes about technology nist

X22 Report
[DS] Epstein Hoax Exposed, Boomerang, Another Election Protection Was Just Introduced, Pain – Ep. 3803

X22 Report

Play Episode Listen Later Dec 23, 2025 85:36


Watch The X22 Report On Video No videos found (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:17532056201798502,size:[0, 0],id:"ld-9437-3289"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");pt> Click On Picture To See Larger PictureThe world is moving away from wind and solar, coal demand is up, China was never going along with the green new scam. Trump is moving carefully through the [CB] minefield economy. Gold is on the move. Trump is moving the country out of the old system. The [DS] try to get Trump with the Epstein hoax, now that the information dropped the people can now see what the [DS] was planning. Ship building is coming back to the US. Trump signs the NDAA that has additional protections for the election. Every step of the way Trump is countering the [DS] cheating system. Economy https://twitter.com/KobeissiLetter/status/2003156645388406992?s=20   consumption, or 4.95 billion tonnes. By comparison, US coal demand stands at 410 million tonnes, just ~5% of the world's total. Meanwhile, the IEA projects a gradual decline in demand over the next 5 years, to ~8.60 billion tonnes by 2030. However, past forecasts of peak coal demand have repeatedly proven wrong, as consumption continues to rise. Coal remains in high demand 23 US States Are At High Risk Of (Or In) Recession Currently  In 2025, states responsible for about a third of U.S. GDP are in recession, or face high recession risk. Another third are expanding, including Florida and Utah, based on payrolls, employment, and other key economic data. This graphic, via Visual Capitalist’s Dorothy Neufeld, shows recession risk by state in 2025, based on analysis from Mark Zandi, chief economist at Moody's Analytics. In Recession/High Risk Treading Water Expanding State/District Business Cycle Status Share of U.S. GDP (%) Georgia In Recession/High Risk 3.03 Montana In Recession/High Risk 0.25 Wyoming In Recession/High Risk 0.18 Michigan In Recession/High Risk 2.44 Massachusetts In Recession/High Risk 2.73 Mississippi In Recession/High Risk 0.53 Minnesota In Recession/High Risk 1.70 Kansas In Recession/High Risk 0.80 Rhode Island In Recession/High Risk 0.28 Delaware In Recession/High Risk 0.34 Washington In Recession/High Risk 3.02 Illinois In Recession/High Risk 3.85 West Virginia In Recession/High Risk 0.36 New Hampshire In Recession/High Risk 0.42 Maryland In Recession/High Risk 1.86 Virginia In Recession/High Risk 2.66 South Dakota In Recession/High Risk 0.25 Connecticut In Recession/High Risk 1.27 Oregon In Recession/High Risk 1.14 Iowa In Recession/High Risk 0.86 New Jersey In Recession/High Risk 2.93 Maine In Recession/High Risk 0.33 District of Columbia In Recession/High Risk 0.64 Missouri Treading Water 1.54 Ohio Treading Water 3.14 Hawaii Treading Water 0.39 Arkansas Treading Water 0.65 New Mexico Treading Water 0.49 Tennessee Treading Water 1.87 New York Treading Water 7.92 Vermont Treading Water 0.16 Alaska Treading Water 0.24 Colorado Treading Water 1.92 California Treading Water 14.50 Nevada Treading Water 0.86 South Carolina Expanding 1.18 Texas Expanding 9.41 Oklahoma Expanding 0.92 Idaho Expanding 0.43 Kentucky Expanding 0.99 Alabama Expanding 1.10 Indiana Expanding 1.81 Nebraska Expanding 0.63 North Carolina Expanding 2.86 Louisiana Expanding 1.11 Florida Expanding 5.78 North Dakota Expanding 0.26 Pennsylvania Expanding 3.54 Arizona Expanding 1.88 Wisconsin Expanding 1.53 Utah Expanding 1.02 Currently, many coastal, Northeastern states are facing some of the worst economic conditions. In Maine, for instance, year-over-year GDP growth is just 0.8% as of Q2 2025, compared to the U.S. average of 2.1%. Meanwhile, Washington, D.C.'s unemployment rate was 6.4% in July, significantly higher than the 4.6% U.S. average given sweeping federal cuts. According to Zandi's analysis, New York and California are “Treading Water”, together responsible for driving over 22% of U.S. GDP. In comparison, Texas, which fuels 9.4% of U.S. economic growth is expanding. Unemployment rates of 4.0% in July remain below the U.S. average. Additionally, the Texas economy is growing faster than the nation, while income growth rose 6.3% annually as of Q2 2025, outpacing the national average.   Source: zerohedge.com (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:18510697282300316,size:[0, 0],id:"ld-8599-9832"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs"); https://twitter.com/unseen1_unseen/status/2003254895143461092?s=20   caused by falling home prices while increasing the affordability of homes. Home builders aren’t going to build more homes if they are losing money. Trump can’t force them to build homes. This is where thinking outside the box comes in play and things like the 50 year mortgage, interest rate cuts, lower down-payments, salt taxes etc get proposed. With deportations and the decline of the boomer generation from old age, supply will be increasing. Prices will come down. The trick is not to allow them to go into a free fall and keep demand high enough to soak up a great deal of that supply. Trump’s proposed $2,000 tariff rebate checks depend on Congress   President Donald Trump needs Congress to take action to make good on a proposal to send some Americans $2,000 tariff rebate checks next year. Director of the National Economic Council Kevin Hassett said the U.S. House and Senate will need to take up the matter. “I would expect that in the new year, the president will bring forth a proposal to Congress to make that happen,” Hassett said on “Face the Nation” on Sunday. Details about Trump’s tariff rebate proposal remain sparse. Trump has said he wants to issue the rebate checks and use the rest of the tariff revenue to pay down the nation’s $38 trillion debt, even as the U.S. Supreme Court has not yet determined whether he has the authority to impose tariffs. Source: thecentersquare.com US Industrial Production Rises At Strongest Annual Rate Since Apr 2022 Following the much-stronger-than-expected GDP print, US Industrial Production also surprised to the upside, rising 0.2% MoM in November and pulling the YoY change up to 2.52% – the strongest annual growth since April 2022… Source: zerohedge.com Trump Boom: U.S. Economy Grows 4.3%, Fastest in Two Years, Smashing Expectations The U.S. economy grew this summer at the fastest pace in two years, far outpacing economists' forecasts. The Commerce Department said U.S. gross domestic product—the government's official economic scorecard—rose at a seasonally and inflation-adjusted 4.3 percent annual rate in the third quarter. The report on the July through September period was delayed due to the shutdown. Consumer spending grew much faster than expected, expanding at a seasonally and inflation-adjusted annual rate of 3.5 percent. That's up from 2.5 percent in the second quarter and above the 2.7 percent expected. Source: breitbart.com    FULL steam ahead — “You haven't seen anything yet!” Thank you for your attention to this matter. MAKE AMERICA GREAT AGAIN! DONALD J. TRUMP PRESIDENT OF THE UNITED STATES OF AMERICA https://twitter.com/EricLDaugh/status/2003149733158588868?s=20 This list is just the table setting for the coming booming economy. Wait till Trump transforms the entire fiat world debt system. A Golden Age for the world approaches. https://twitter.com/KobeissiLetter/status/2003285919668011147?s=20    good news, the Market went up. Nowadays, when there is good news, the Market goes down, because everybody thinks that Interest Rates will be immediately lifted to take care of “potential” Inflation. That means that, essentially, we can never have a Great Market again, those Markets from the time when our Nation was building up, and becoming great. Strong Markets, even phenomenal Markets, don't cause Inflation, stupidity does! I want my new Fed Chairman to lower Interest Rates if the Market is doing well, not destroy the Market for no reason whatsoever. I want to have a Market the likes of which we haven't had in many decades, a Market that goes up on good news, and down on bad news, the way it should be, and the way it was. Inflation will take care of itself and, if it doesn't, we can always raise Rates at the appropriate time — But the appropriate time is not to kill Rallies, which could lift our Nation by 10, 15, and even 20 GDP points in a year — and maybe even more than that! A Nation can never be Economically GREAT if “eggheads” are allowed to do everything within their power to destroy the upward slope. We are going to be encouraging the Good Market to get better, rather than make it impossible for it to do so. We are going to see numbers that are far more natural, and far better, than they have ever been before. We are going to, MAKE AMERICA GREAT AGAIN! The United States should be rewarded for SUCCESS, not brought down by it. Anybody that disagrees with me will never be the Fed Chairman! Political/Rights https://twitter.com/libsoftiktok/status/2003309528805470611?s=20 https://twitter.com/MrAndyNgo/status/2003266300832038926?s=20 https://twitter.com/libsoftiktok/status/2003271819705389139?s=20   interfere with immigration operations. https://twitter.com/libsoftiktok/status/2003378383862817224?s=20 https://twitter.com/BillMelugin_/status/2002573015142576350?s=20 https://twitter.com/TriciaOhio/status/2002801058897142114?s=20   This was a targeted operation to arrest Fernandez Flores, a criminal illegal alien from Honduras with a criminal conviction for making a false police report. Flores entered the United States illegally at unknown date and location without inspection by an immigration officer. He will remain in ICE custody pending further immigration proceedings. If you come to our country illegally and break our laws, we will find you, we will arrest you, and you will not return. https://twitter.com/DHSgov/status/2003130997198713329?s=20https://twitter.com/MJTruthUltra/status/2003214521419333695?s=20 https://twitter.com/MJTruthUltra/status/2003214521419333695?s=20 WATCH: Justice Department Releases Shocking Recreation Video of Jeffrey Epstein Trying to Kill Himself The Justice Department on Monday released recreation video of Jeffrey Epstein inside of his jail cell trying to kill himself. The video – which was revealed to be computer-generated – is timestamped August 10, 2019 at 4:29 am ET – Epstein was found dead at 6:30 am ET on August 10, 2019. Prosecutors previously said that the two CCTV cameras positioned outside of Epstein's cell had malfunctioned. The 10-second recreation video shows Epstein sitting on the floor of his cell attempting to kill himself. WATCH:  Source: thegatwaypundit.com  https://twitter.com/MarioNawfal/status/2003476301970133417?s=20  “a circular line of erythema at the base of the neck” along with other marks of friction and bruising on his knee. Epstein told prison staff he didn't remember what happened but was afraid to return to the Special Housing Unit, saying it was “where he had gotten marks on his neck and he does not know why it happened.” He said he had only slept 30 minutes a night for five days due to noise and stress. His cellmate, ex-cop Nicholas Tartaglione, had reportedly been harassing him, and Epstein claimed “he tried to kill me.” Staff noted Tartaglione had been aggressive and was seen mocking Epstein with a string around his neck. Despite these signs, the incident was labeled a “possible suicide attempt.” https://twitter.com/MarioNawfal/status/2003292687835787393?s=20  were actively tracking and attempting to contact 10 individuals connected to Epstein’s crimes. The email references attempts to contact Brunel (modeling agent Jean-Luc Brunel, who later died in prison), Maxwell (Ghislaine, now serving 20 years), and mentions “Ohio contacting Wexner.” Les Wexner is the billionaire L Brands founder who gave Epstein his $77 million NYC mansion and served as his primary financial benefactor for years. A separate confidential document from law firm Debevoise & Plimpton lists SDNY matters they appeared in, including one entry: “Wexner: Epstein investigation.” 10 co-conspirators. Only Maxwell was ever charged. The names behind those black boxes are the real story here. https://twitter.com/MikeBenzCyber/status/2003358231780032675?s=20 https://twitter.com/MarioNawfal/status/2003480729624412240?s=20  and his residence as Dammam, Saudi Arabia. Profession listed: “Manager.” It's part of a trove of thousands of Epstein-related files released overnight. https://twitter.com/MarioNawfal/status/2003436034709995730?s=20   from Epstein's properties – computers, hard drives, disks, the digital nervous system of the operation. And they can't get it. At one point, frustration boils over into honesty: “The FBI is completely fucking us on this.” That's not a tweet. That's an internal DOJ message. Translation: the prosecutors responsible for bringing cases did not have a clear, reliable accounting of the evidence in the FBI's possession. Not what was seized. Not what was imaged. Not what was searchable. Not what was missing. This isn't incompetence in a vacuum. It's structural. Evidence control is power. Whoever controls the data controls the pace, the scope, and the fallout. And remember: Epstein died before trial. Maxwell was prosecuted narrowly. No broader conspiracy case ever materialized. Prediction: this is why. Not because the evidence didn't exist- but because it never cohered into something prosecutors could safely touch without detonating their own case. The scandal isn't just who was on the tapes. It's that even the feds couldn't tell you where the tapes went. That's not a cover-up movie plot. That's a system quietly eating itself. https://twitter.com/sentdefender/status/2003457025695719784?s=20  and sensationalist claims made against President Trump that were submitted to the FBI right before the 2020 Election. To be clear: the claims are unfounded and false, and if they had a shred of credibility, they certainly would have been weaponized against President Trump already.” New: More Epstein Files Drop, and Donald Trump Appears to Be the Star This Time Around So, what incriminating evidence against President Trump is to be found in this latest drop? Apparently, an email from January 2020 in which a federal prosecutor from New York – of course – to an “undisclosed person” claiming Trump had flown on Jeffrey Epstein’s private plan at least eight times during the 1990s, and one time there was a 20-year-old woman on the flight.  Here’s more: The email, which was sent in January 2020 from a federal prosecutor in New York to an undisclosed person, says, “For your situational awareness, wanted to let you know that the flight records we received yesterday reflect that Donald Trump traveled on Epstein's private jet many more times than previously has been reported (or that we were aware), including during the period we would expect to charge in a [Ghislaine] Maxwell case.”  This big revelation is that Trump traveled a few more times than we previously knew, although this was during a time period that the president has already acknowledged having had an association with Epstein. Note the timing of the email – January 2020 is when the presidential election would be kicking into full swing. This anonymous federal prosecutor clearly thought they had a gotcha moment, but there’s a pesky little detail that puts things in perspective: “[Trump] is listed as having traveled with, among others and at various times, Marla Maples, his daughter Tiffany, and his son Eric.”  Source: redstate.com The specific document you’re referring to appears to be the complaint filed in the 2020 civil lawsuit Doe v. Indyke et al. (Case No. 1:20-cv-00484, S.D.N.Y.), which was part of the recently released Epstein files by the U.S. Department of Justice.  This lawsuit was brought by an anonymous plaintiff (“Jane Doe”) against the executors of Jeffrey Epstein’s estate (Darren Indyke and Richard Kahn) and Ghislaine Maxwell, seeking compensation for alleged sexual abuse and trafficking by Epstein.How Trump’s Name Appears in the DocumentOn page 4 of the complaint, the plaintiff alleges that during one of her encounters with Epstein (around the 1990s), he took her to Trump’s Mar-a-Lago resort in Florida when she was 14 years old. Epstein reportedly introduced her to Donald Trump (then the owner of Mar-a-Lago), elbowed him playfully, and asked, referring to the girl, “This is a good one, right?” Trump is described as smiling and nodding in agreement, after which they both chuckled. The plaintiff states she felt uncomfortable but was too young to understand why at the time. The document does not accuse Trump of any criminal wrongdoing or involvement in Epstein’s abuse; it frames this as part of the broader context of her grooming and exploitation by Epstein.How the Name Got Into the DocumentTrump’s name was included as part of the plaintiff’s personal allegations detailing her experiences with Epstein. The complaint is a legal filing where the victim recounts specific incidents to support her claims against Epstein’s estate and associates. It reflects her firsthand account, not a court-verified fact or evidence from other sources.  There is no mention of independent corroboration (e.g., witnesses, photos, or records) in the filing itself, and it has not been adjudicated in court as true.Source of the AllegationThe source is the anonymous plaintiff (“Jane Doe”), who claims to be a victim of Epstein’s abuse starting from age 13 or 14.  She was reportedly recruited at a summer camp in Michigan and alleges ongoing grooming and assaults by Epstein over several years. This Doe is distinct from other known accusers like Virginia Giuffre, though a similar incident (Epstein introducing a 14-year-old to Trump at Mar-a-Lago without the “good one” comment) was testified to by another accuser (“Jane”) during Ghislaine Maxwell’s 2021 criminal trial.  https://twitter.com/disclosetv/status/2003236602374713557?s=20 DOGE Geopolitical https://twitter.com/BreannaMorello/status/2003196698974191914?s=20   that are protected under the Constitution. Under D.C. law, anyone wishing to own a firearm must register it with the MPD. However, the D.C. Code imposes a sweeping ban on the registration—and thus the legal possession—of a wide range of firearms. This broad prohibition, the Justice Department argues, infringes on the Second Amendment rights of law-abiding citizens who seek to keep and bear commonly owned firearms for lawful purposes. Trump's DOJ Sues Washington, D.C. Police Department Over Unconstitutional Ban on Semi-Automatic Firearms The Department of Justice has filed a lawsuit against the District of Columbia's Metropolitan Police Department for enforcing a ban on semi-automatic firearms in violation of the Second Amendment. The lawsuit alleges that D.C.'s gun laws require registration of all firearms with the MPD; however, the D.C. Code imposes a sweeping ban on numerous protected weapons, making it legally impossible for residents to own them for self-defense or other lawful purposes. The DOJ said in a press release announcing the lawsuit: “MPD's current pattern and practice of refusing to register protected firearms is forcing residents to sue to protect their rights and to risk facing wrongful arrest for lawfully possessing protected firearms.” “Today's action from the Department of Justice's new Second Amendment Section underscores our ironclad commitment to protecting the Second Amendment rights of law-abiding Americans,” said Attorney General Pamela Bondi. Bondi continued, “Washington, DC's ban on some of America's most popular firearms is an unconstitutional infringement on the Second Amendment — living in our nation's capital should not preclude law-abiding citizens from exercising their fundamental constitutional right to keep and bear arms.” Echoing this sentiment, Assistant Attorney General Harmeet K. Dhillon of the Civil Rights Division added, “This Civil Rights Division will defend American citizens from unconstitutional restrictions of commonly used firearms, in violation of their Second Amendment rights. The newly established Second Amendment Section filed this lawsuit to ensure that the very rights D.C. resident Mr. Heller secured 17 years ago are enforced today — and that all law-abiding citizens seeking to own protected firearms for lawful purposes may do so.” The case draws directly from the landmark 2008 Supreme Court decision in District of Columbia v. Heller, where the Court affirmed that the Second Amendment protects the right of law-abiding citizens to own semi-automatic weapons in their homes for self-defense. Source: thegatewaypundit.com https://twitter.com/CynicalPublius/status/2003192220753723840?s=20 https://twitter.com/disclosetv/status/2003238094057955337?s=20 War/Peace https://twitter.com/WarClandestine/status/2003334956479558072?s=20 there will be no escalation into broader conflict, and the decision has already been made. However, precision air strikes on cartel assets seems like a probable outcome. Trump is neutralizing Deep State assets around the globe, and South/Central American drug cartels are assets of the Deep State. They are transnational criminal organizations responsible for the drug, weapon, and human trafficking of the Western hemisphere, and their racket feeds the Deep State machine. My guess is, that cartel drug factories and assets are going to get smoked by the US MIL via precision air strikes, and the other powerful leaders of the world have already agreed to some sort of deal with Trump and no one will interfere. Just like Iran and Syria. I think most of the leaders/nations of the world agree with Trump that these transnational criminal organizations must be eradicated, and stability must be brought to the world. President Unveils ‘Trump Class’ Of Warships, Huntington Ingalls Shares Jump    build two new “Trump-class” battleships, to acquire 20-25 of these ships in the coming years.   In his address, the President noted these 30,000-40,000 ton ships will carry a large quantity of missiles, including hypersonic missiles, and will also be outfitted with electromagnetic rail guns and directed energy lasers. Trump-class battleships will also carry nuclear-armed sea launched cruise missiles (currently under development) adding an additional element of nuclear deterrence to the Navy. Trump-class destroyers appear to be designed as the center of enhanced command and control networks at sea, as the Navy looks to field more autonomous assets and traditional vessels in the coming years.   The first “Trump-class” battleship will be named USS Defiant, and it will be even longer than the Iowa-class battleships of the World War II era. However, at 35,000 tons, it will only weigh about half as much, and have a smaller crew of between 650 and 850 sailors; the Iowa had some 2,700 sailors. The new ships — which are being called “guided missile battleships” —  are part of larger vision for a “Golden Fleet.” The Navy has rolled out a website to promote that concept. Sources tell AP that construction of the Defiant is expected to start in the early 2030’s, with another 19 to 24 Trump-class ships to follow.   Source: zerohedge.com https://twitter.com/EricLDaugh/status/2003231263520379120?s=20   that kind of money, they HAVE to build quickly!”   “We want the dividends to go into the creation of production facilities. We’ll be talking about CapEx, dividends and the pay.” “Also, buybacks…they want to buy back their stock. I want them to put their money in plants and equipment! So they can build these planes FAST, like, IMMEDIATELY!” Medical/False Flags https://twitter.com/FBIDirectorKash/status/2003224842078675311?s=20  of American institutions or threats to our food supply, economy, or public safety. Protecting the homeland means vigilance: every time, no exceptions. https://twitter.com/ThomasMoreSoc/status/2003262595566850541?s=20  precedent-setting victory, a federal court has permanently blocked California AG Rob Bonta and the CA Dept. of Education from forcing teachers to lie to parents about their own children’s secret gender transitions—declaring parents have a constitutional right to know and teachers have a constitutional right to share the truth. [DS] Agenda https://twitter.com/CynicalPublius/status/2003205278796501397?s=20  larger scale. Don't forget that the Malthusians are antihuman and that they believe that 7 out of every 8 human lives on the planet must be terminated in order to save the world. Nearly 100 Minnesota Mayors Send Panicked Letter to Lawmakers Complaining About Fraud Scandal and the Leadership of Tim Walz Almost 100 mayors in the state of Minnesota have sent a letter to state lawmakers complaining about the fraud scandal and how it is going to impact the communities they serve. They are clearly not happy with the leadership of Governor Tim Walz and his connections to the fraud scandal that has rocked the state in recent weeks. The scandal is still unfolding and it's unclear what the final tally will be, but it's looking like something in the tens of billions. FOX News reports:  You can see the full letter here. These mayors should have demanded that Tim Walz resign. Source: thegatewaypundit.com https://twitter.com/elonmusk/status/2002771316345327905?s=20 Our crooked politicians have set up the biggest money laundering operation in the world and that 38 trillion in debt is almost all tied to fraud. this is the tip of the iceberg. Buckle up, its all being exposed. Your harder earned money was used to support a criminal syndicate.  President Trump's Plan  https://twitter.com/DcLidstone/status/2003338615917806050?s=20 John Brennan Lawyers Confirm Their Client is a “Target” of a Grand Jury Investigation Lawfare lawyer Kenneth Wainstein representing former CIA Director John Brennan confirmed in a proactive litigation letter to Chief Judge Cecilia M. Altonaga of the Federal District Court for the Southern District of Florida, their client is a “target” of a grand jury investigation. The word “target” is important here, because the letter specifically outlines how Brennan has received subpoenas for documents and information surrounding his construct of the 2017 Intelligence Community Assessment. The letter notes that prosecutors from the Office of the United States Attorney for the Southern District of Florida, Jason Reding Quiñones, have advised Mr. Brennan that he is “a target” of a grand jury investigation.   [SOURCE] Pay attention to the footnotes being cited by Brennan's lawyers as they begin to pull in some of the commentary by voices who have publicly given opinion about the overall Trump targeting operation.  Mike Davis name appears frequently in this letter, as the Brennan defense team begins to frame the conspiratorial nature of some claims against their client. In essence, the Brennan legal team are attempting to refute the evidence by pointing to the blanket of some crazy commentary that covers it. This is exactly what I have been cautioning about {SEE HERE}. Source: theconservativetreehouse.com https://twitter.com/TheStormRedux/status/2003448097930662069?s=20  Cannon's courtroom. FANTASTIC. https://twitter.com/amuse/status/2003133420021424297?s=20   Thune objected the president would be able to adjourn Congress for ten days and get his full team on the field. https://twitter.com/DavidShafer/status/2002953961595449763?s=20 National Defense Authorization Act (NDAA) Contains Hidden Election Integrity Gem – Could Have Huge Implications for Voting Machines    With the National Defense Authorization Act signed by President Donald Trump on December 18th, 2025, a little-known section was snuck into the 3000+ page bill:  Section 6805. Requiring Penetration Testing As Part Of The Testing And Certification of Voting Systems. This section amends the Help America Vote Act of 2002 by adding a “Required Penetration Testing” section that “provides for the conduct of penetration testing as part of the testing, certification, decertification, and recertification of voting system hardware and software” by an accredited laboratory. The amendment now requires the penetration testing as a condition of certification from the U.S. Election Assistance Commission (EAC) and allows consultation with the National Institute of Standards and Technology or any other federal agency on “lab selection criteria” and “other aspects of the program.” While this is still short of a legitimate attempt at ensuring election integrity, it is an effort toward scrutinizing the voting systems by finally requiring cybersecurity experts to do what Clay Parikh was restricted from doing during his time as a VSTL contractor. Hand-marked paper ballots hand-counted at the precinct level, is being utilized in Dallas County, TX for the 2026 midterm primaries, and is still the ultimate goal of the election integrity community to ensure free and fair elections in the United States. Source: thegatewaypundit.com Penetration testing, often abbreviated as “pen testing,” is a cybersecurity practice where authorized experts simulate real-world cyberattacks on a computer system, network, or application to identify and exploit vulnerabilities before malicious actors can do so. The goal is to uncover weaknesses in security measures, such as software flaws, misconfigurations, or inadequate defenses, and provide recommendations for remediation. It typically involves several stages: Planning and reconnaissance: Gathering information about the target system. Scanning: Using tools to probe for potential entry points. Gaining access: Attempting to exploit vulnerabilities to breach the system. Maintaining access: Testing how long access can be sustained without detection. Analysis and reporting: Documenting findings, risks, and fixes. In the context of Section 6805 of the Fiscal Year 2026 National Defense Authorization Act (NDAA), which incorporates provisions from the SECURE IT Act (H.R. 6315), penetration testing is mandated as part of the testing, certification, decertification, and recertification process for voting system hardware and software. The Election Assistance Commission (EAC) must implement this requirement within 180 days of enactment, with accreditation of testing entities handled through recommendations from the National Institute of Standards and Technology (NIST). This ensures that voting systems used in federal elections undergo rigorous cybersecurity assessments to detect and mitigate vulnerabilities, enhancing election security Poll: Trump's Approval Rating Lands at 50 Percent, 9 Points Above Water President Donald Trump enjoys a 50 percent approval rating, with a net approval rating of plus 9 points, according to the latest polling from InsiderAdvantage.  Source: breitbart.com (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:13499335648425062,size:[0, 0],id:"ld-7164-1323"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="//cdn2.customads.co/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");

united states america american new york director california texas president success new york city donald trump china education house washington technology leadership americans pain michigan office gold home ohio elections planning predictions market dc western minnesota mom plan utah congress fbi world war ii code iran testing court target iowa supreme court buckle tx navy protecting ice maine senate columbia inflation maintaining standards fox news saudi arabia syria constitution markets ship exposed fantastic consumer analytics prices analysis rates gaining epstein flores golden age national institutes gdp jeffrey epstein honduras unemployment moody translation interest rates profession fastest hoaxes doj lago coal second amendment prosecutors cb ds tim walz justice department deep state ghislaine maxwell documenting boomerang heller cctv defiant rallies bondi jane doe northeastern mike davis southern district make america great again capex yoy fiscal year iea echoing ndaa national defense authorization act how trump virginia giuffre commerce department dhillon mpd voting systems brunel thune united states attorney dallas county treading water hassett civil rights division createelement metropolitan police department sdny technology nist cia director john brennan fed chairman case no federal district court parentnode getelementbyid plimpton national defense authorization act ndaa mark zandi debevoise zandi economy grows wexner l brands jean luc brunel marla maples election protection visual capitalist dammam uss defiant help america vote act mrandyngo ca dept intelligence community assessment
Business of Tech
MSP Cybersecurity: Navigating AI Accountability and Job Market Shifts in 2025

Business of Tech

Play Episode Listen Later Dec 19, 2025 17:38


Conflicting jobs data indicates a complex economic landscape for IT service providers, as the unemployment rate in the tech sector has risen to 4% with a loss of 134,000 jobs between October and November 2025. Despite a drop in the overall unemployment rate to 4.2% and a projected growth of managed services contributing $608 billion to the B2B technology sector, the mixed signals from economic indicators complicate decision-making for the Federal Reserve and raise concerns about consumer spending. Analysts emphasize that the current job losses reflect a shift in responsibility from internal roles to external managed service providers (MSPs), which may not alleviate underlying risks.The National Institute of Standards and Technology (NIST) has released a draft profile addressing cybersecurity challenges posed by artificial intelligence (AI), highlighting the need for organizations to manage AI-related security risks effectively. This profile outlines how AI can enhance cybersecurity defenses while also detailing the responsibilities that come with its deployment. Recent assessments reveal that while some AI models perform better in security contexts, the lack of clarity around accountability when AI systems make decisions remains a significant concern for MSPs.Private equity activity is accelerating in the managed services sector, exemplified by Broadwing Capital's acquisition of CloudScale365, which aims to create a platform addressing gaps in the fragmented IT-managed services market. This consolidation trend raises questions for MSPs about operational norms and the potential loss of control over their business models. As platforms seek to standardize pricing and decision-making processes, MSPs must consider how these changes will affect their service delivery and customer relationships.For MSPs and IT service leaders, the evolving landscape underscores the importance of understanding where risk is shifting and how to price and govern accordingly. The retreat from AGI hype and the focus on practical AI applications signal a need for clarity in decision-making processes, particularly as automation becomes more prevalent. MSPs that can articulate the limitations of their AI systems and establish clear accountability frameworks will be better positioned to navigate the complexities of the current market. Four things to know today00:00 As Jobs Data Conflicts and Tech Employment Slips, Managed Services Absorb Risk and Responsibility05:46 NIST's AI Security Framework Meets Reality as Model Safety Gaps Expose Accountability Risks08:54 Broadwing Launches MSP Platform to Standardize Scale, Signaling Growing PE Pressure on MSP Operations11:03 AI Rebrands Itself as Open Source Expands, Automation Scales, and Accountability Gets Murkier This is the Business of Tech.    Supported by:  https://saasalerts.com/mspradio/ 

IAQ Radio
Dustin Poppendieck, PhD - Evaluating Air Cleaning Technologies

IAQ Radio

Play Episode Listen Later Dec 5, 2025 62:18


Dustin Poppendieck is an environmental engineer at the National Institute of Standards and Technology (NIST). He received his PhD in Civil and Environmental Engineering from the University of Texas at Austin in 2002. He is a fellow of the International Society for Indoor Air Quality and Climate (ISIAQ). Dustin has been investigating indoor air chemistry since 2002. Most of his efforts have involved characterizing primary emission sources and heterogeneous reactions at material surfaces. He has investigated emissions from kerosene can lamps used by nearly a billion people throughout the developing world, spray polyurethane foam, non-smoldering cigarette butts and indoor air cleaning devices. In addition, Dustin has studied the disinfection of biologically contaminated building materials (i.e., anthrax) using high concentrations of ozone, chlorine dioxide, hydrogen peroxide and methyl bromide. Recently, Dustin has been involved in writing and revising standards related to chemistry of portable air cleaners, including ASTM D8625, UL867, ASHRAE 241 and ASHRAE 145.4.

Clocking In: Voices of NC Manufacturing
E-69: Adapting, Innovating, and Building the Future

Clocking In: Voices of NC Manufacturing

Play Episode Listen Later Dec 1, 2025 20:02


In this episode of Clocking In: Voices of NC Manufacturing, host Phil Mintz sits down with Lindsey Crisp, President and CEO of Carver Machine Works—also known as CMW Global—a nearly 50-year-old manufacturing company located just steps from the Pamlico River in Washington, North Carolina. Lindsey shares how Carver Machine Works has evolved from repairing phosphate mining equipment in the 1970s to becoming a trusted supplier for the industrial and naval defense industries. With a background in accounting, Lindsey offers a unique perspective on manufacturing leadership, financial management, and how adaptability has fueled the company's longevity and growth. Listeners will hear insights on Carver's transformation, its commitment to quality certifications, and innovative approaches to workforce development, additive manufacturing, and AI adoption. LINKS NCMEP | IES | Carver Machine Works ABOUT The North Carolina Manufacturing Extension Partnership (NCMEP) NCMEP is the official state representative of the Hollings Manufacturing Extension Partnership (MEP), a program of the U.S. Department of Commerce's National Institute of Standards and Technology (NIST). The MEP National Network is a unique public-private partnership that delivers comprehensive solutions to manufacturers, fueling growth and advancing U.S. manufacturing. NCMEP is administered by NC State University Industry Expansion Solutions and partners with the Economic Development Partnership of NC, the Polymers Center of Excellence, Manufacturing Solutions Center, Hangar6, University of North Carolina at Charlotte Industrial Solutions Lab, and NC State University Wilson College of Textiles to help manufacturing companies develop and maintain efficient operations that are well-positioned to grow profitably. NC State University Industry Expansion Solutions (IES) Through combined resources and collaboration efforts, NC State University Industry Expansion Solutions provides services that help manufacturers to: Expand Local and U.S. Supply Chain Vendor Relationships Access Customized Training Programs to Narrow the Workforce Gap Realize the Efficiencies of Smart Manufacturing and Advanced Technology Save Time and Energy through Improved Processes, Productivity and Capacity Expand Facility and Equipment Capabilities Increase Sales and Profits Create and Retain Jobs Streamline New Product Design, Testing, Development and Time to Market CMW Global CMW Global, formerly known as Carver Machine Works, is a Washington, North Carolina–based, engineering-driven metal fabrication and machine shop that delivers world-class services to aerospace, defense, and industrial manufacturing sectors. Their capabilities span precision machining, custom metal fabrication, mechanical assembly, welding, refurbishment, and reverse engineering. With a strong commitment to quality, CMW Global operates under ISO 9001 and other industry certifications. What sets them apart is their ability to tackle mission-critical, high-value, and complex components while ensuring tight control over process, cost, and schedule. Dr. Phil Mintz Dr. Phil Mintz is the executive director of NC State Industry Expansion Solutions (IES) and director of the North Carolina Manufacturing Extension Partnership (NCMEP). Phil drives outreach to NC manufacturers, builds relationships with federal and state leaders, and coordinates efforts to drive profitable manufacturing growth in the state. He also leads the broader IES Extension Operations outreach unit of regional managers, technical specialists, and business development leaders, providing business engagement, assessment, and improvement tools. This includes statewide peer networks, ISO 9000 quality management systems, Six Sigma, Lean manufacturing, environmental services, and health and safety solutions. Lindsey Crisp Lindsey Crisp is President and CEO of Carver Machine Works (CMW Global). A graduate of East Carolina University with a background in accounting, Lindsey is both a Certified Public Accountant (CPA) and a Chartered Global Management Accountant (CGMA). Under his leadership, Carver Machine Works has expanded its capabilities and market reach, becoming a model of resilience, innovation, and community-centered manufacturing.

Embedded
515: Script Boomers

Embedded

Play Episode Listen Later Nov 27, 2025 70:23


Nick Kartsioukas joined us to talk about security in embedded systems.  Common Vulnerabilities and Exposures (CVE) is the primary database to check your software libraries, tools, and OSs: cve.org. Open Worldwide Application Security Project (OWASP, owasp.org) has information on how to improve security in all kinds of applications, including embedded application security. There are also cheatsheets, Nick particularly recommends Software Supply Chain Security - OWASP Cheat Sheet.  Wait, what is supply chain security? Nick suggested a nice article on github.com: it is about your code and tools including firmware update, a common weak point in embedded device security. Want to try out some security work? There are capture the flag (CTF) challenges including the Microcorruption CTF (microcorruption.com) which is embedded security related. We also talked about the SANS Holiday Hack Challenge (also see Prior SANS Holiday Hack Challenges). This episode is brought to you by  RunSafe Security. Working with C or C++ in your embedded projects? RunSafe Security helps you build safer, more resilient devices with build-time SBOM generation, vulnerability identification, and patented code hardening. Their Load-time Function Randomization stops the exploit of memory-based attacks, something we all know is much needed. Learn more at RunSafeSecurity.com/embeddedfm. Some other sites that have good information embedded security: This World Of Ours by James Mickens is an easy read about threat modelling Cybersecurity and Infrastructure Security Agency (CISA) is at cisa.gov and, among other things, they describe SBOMs in great detail National Institute of Standards and Technology (NIST) also provides guidance: Internet of Things (IoT) | NIST  NIST Cybersecurity for IoT Program  NIST SP800-213 IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements There is a group of universities and organizations doing research into embedded security: National Science Foundation Center for Hardware and Embedded Systems Security and Trust (CHEST). Descriptive overview and the site is nsfchest.org European Telecommunications Standards Institute (ETSI) - Consumer IoT Security Camera Ubiquiti configuration issue (what not to do) Finally, Nick mentioned Stop The Bleed which provides training on how you can control bleeding, a leading cause of death. They even have a podcast (and we know you like those). Elecia followed up with Community Emergency Response Teams (CERT). Call your local fire department and ask about training near you! Transcript

Clocking In: Voices of NC Manufacturing
E-68: Remanufacturing, Relationships, and Resilience: Jason Alexander of Alotech, Inc.

Clocking In: Voices of NC Manufacturing

Play Episode Listen Later Nov 3, 2025 28:11


In this episode of Clocking In: Voices of NC Manufacturing, host Phil Mintz sits down with Dr. Jason Alexander, Business Development Manager at Alotech, Inc., a contract manufacturing company based in Goldston, North Carolina. Alotech's journey—from its early roots in remanufacturing to its expansion into machining, engineering, logistics, and product development—reflects both the adaptability and innovation driving North Carolina's manufacturing economy. The company was recognized with the 2019 NCMEP Manufacturing Leadership Award for innovative practices that improved customer profit margins through remanufacturing process improvements. Jason shares his remarkable personal and professional path—from a college basketball standout to a leader in sustainable manufacturing—and discusses how determination, mentorship, and community relationships have shaped his career. LINKS NCMEP | IES | Alotech ABOUT The North Carolina Manufacturing Extension Partnership (NCMEP) NCMEP is the official state representative of the Hollings Manufacturing Extension Partnership (MEP), a program of the U.S. Department of Commerce's National Institute of Standards and Technology (NIST). The MEP National Network is a unique public-private partnership that delivers comprehensive solutions to manufacturers, fueling growth and advancing U.S. manufacturing. NCMEP is administered by NC State University Industry Expansion Solutions and partners with the Economic Development Partnership of NC, the Polymers Center of Excellence, Manufacturing Solutions Center, Hangar6, University of North Carolina at Charlotte Industrial Solutions Lab, and NC State University Wilson College of Textiles to help manufacturing companies develop and maintain efficient operations that are well-positioned to grow profitably. NC State University Industry Expansion Solutions (IES) Through combined resources and collaboration efforts, NC State University Industry Expansion Solutions provides services that help manufacturers to: Expand Local and U.S. Supply Chain Vendor Relationships Access Customized Training Programs to Narrow the Workforce Gap Realize the Efficiencies of Smart Manufacturing and Advanced Technology Save Time and Energy through Improved Processes, Productivity and Capacity Expand Facility and Equipment Capabilities Increase Sales and Profits Create and Retain Jobs Streamline New Product Design, Testing, Development and Time to Market Dr. Phil Mintz Dr. Phil Mintz is the executive director of NC State Industry Expansion Solutions (IES) and director of the North Carolina Manufacturing Extension Partnership (NCMEP). Phil drives outreach to NC manufacturers, builds relationships with federal and state leaders, and coordinates efforts to drive profitable manufacturing growth in the state. He also leads the broader IES Extension Operations outreach unit of regional managers, technical specialists, and business development leaders, providing business engagement, assessment, and improvement tools. This includes statewide peer networks, ISO 9000 quality management systems, Six Sigma, Lean manufacturing, environmental services, and health and safety solutions. Dr. Jason Alexander Dr. Jason Alexander is the Business Development Manager for Allotech, Inc., where he leads efforts to match the company's broad manufacturing capabilities to customer needs. A former college athlete and educator, Jason's unique background spans entrepreneurship, humanitarian service, and leadership—earning him the President's Lifetime Achievement Award for Volunteerism in 2022.

Business of Tech
From Theory to Practice: Quantum Computing's Impact on Security and Business by 2035

Business of Tech

Play Episode Listen Later Oct 30, 2025 14:12


Recent advancements in quantum computing are pushing the technology closer to practical application, with companies like Google, IBM, and ICONIC making significant strides in stabilizing quantum systems. This progress poses risks to current encryption methods, as traditional security measures may become obsolete due to quantum capabilities. The National Institute of Standards and Technology (NIST) is advocating for the adoption of post-quantum cryptography (PQC) to protect sensitive data, emphasizing the urgency for organizations to reassess their security protocols. Failure to act could result in severe repercussions, including data breaches and regulatory noncompliance.Google's quantum computing division has published research demonstrating practical applications for quantum computers, such as using quantum technology for nuclear magnetic resonance to estimate atomic structures. The company is shifting its focus from merely proving quantum feasibility to making the technology cost-effective. Sundar Pichai, CEO of Alphabet, expressed optimism about the timeline for commercially viable quantum computing, while industry opinions vary, with some experts suggesting practical applications may still be decades away. This divergence highlights the uncertainty surrounding the timeline for widespread quantum adoption.In addition to quantum computing advancements, the episode discusses the integration of PQC into mainstream technology. Microsoft Windows 11 has begun incorporating PQC algorithms into its cryptographic APIs, allowing for the generation of PQC key pairs and hybrid TLS handshakes. Meanwhile, companies like Palo Alto Networks are updating their software to support quantum-resistant encryption. These developments indicate a growing recognition of the need for quantum-safe security measures as organizations prepare for the potential threats posed by quantum computing.For Managed Service Providers (MSPs) and IT decision-makers, the implications are clear: proactive measures are necessary to prepare for the quantum computing era. MSPs should assist clients in inventorying their cryptographic systems and developing a roadmap for adopting PQC. As the U.S. government urges organizations to transition to quantum-safe encryption by 2035, MSPs must prioritize updating protocols and exploring quantum-resistant solutions. The transition to quantum-safe encryption is a multi-year effort, and early preparation will help mitigate future risks associated with quantum advancements. One thing to know today00:00 All About Quantum Computing This is the Business of Tech.    Supported by:  

Business of Tech
F5 Security Breach Prompts CISA Action, NIST AI Risks, SMBs Must Adapt, Apple Boosts Bug Bounty

Business of Tech

Play Episode Listen Later Oct 16, 2025 14:24


The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive for federal agencies to update their F5 products following a significant breach where hackers accessed source code and undisclosed vulnerabilities. This incident, discovered in August, poses a serious risk to federal networks, as the threat actor could exploit these vulnerabilities to gain unauthorized access and exfiltrate sensitive data. Agencies are required to apply the latest updates by October 22nd and report their F5 deployments by October 29th, highlighting the urgency of addressing these security concerns.In a related development, the National Institute of Standards and Technology (NIST) is encouraging federal agencies to take calculated risks with artificial intelligence (AI) under new federal guidance. Martin Stanley, an AI and cybersecurity researcher, emphasized the importance of risk management in AI deployment, particularly in comparison to more established sectors like financial services. As agencies adapt to this guidance, they must identify high-impact AI applications that require thorough risk management to ensure both innovation and safety.A report from Cork Protection underscores the need for small and medium-sized businesses (SMBs) to adopt a security-first approach in light of evolving cyber threats. Many SMBs remain complacent, mistakenly believing they are not targets for cybercriminals. The report warns that this mindset, combined with the rising financial risks associated with breaches, necessitates a shift towards a security-centric operational model. The cybersecurity services market is projected to grow significantly, presenting opportunities for IT service providers that prioritize security.Apple has announced a substantial increase in its bug bounty program, now offering up to $5 million for critical vulnerabilities. This move reflects the growing importance of addressing security challenges within its ecosystem, which includes over 2.35 billion active devices. The company has previously awarded millions to security researchers, emphasizing its commitment to user privacy and security. As the landscape of cybersecurity evolves, managed service providers (MSPs) are urged to tighten vendor monitoring, incorporate AI risk assessments, and focus on continuous assurance to meet the increasing demands for security. Three things to know today00:00 Cybersecurity Crossroads: F5 Breach, AI Risk, and Apple's $5M Bug Bounty Signal Security Accountability06:44 Nearly a Third of MSPs Admit to Preventable Microsoft 365 Data Loss, Syncro Survey Finds09:22 AI Reality Check: Workers' Overconfidence, Cheaper Models, and Microsoft's Scientific Breakthrough Signal Maturity in the Market This is the Business of Tech.     Supported by:  https://mailprotector.com/mspradio/ 

Clocking In: Voices of NC Manufacturing
E-67: A Story of Innovation and Domestic Manufacturing

Clocking In: Voices of NC Manufacturing

Play Episode Listen Later Oct 7, 2025 21:50


In this episode of "Clocking In, Forces of NC Manufacturing," host Phil Mintz, director of the North Carolina Manufacturing Extension Partnership (NCMEP), interviews John Weir, the founder and CEO of I2E Group ( I2E stands for "Innovation to Execution”). Based in High Point, North Carolina, the I2E Group specializes in the design, development, and production of a variety of electronic assemblies, including printed circuit boards, electromechanical assemblies, cable assemblies, and harness assemblies. Weir founded his first company, Nimbus Technologies, in 1993, which was a contract manufacturing business. He later started the I2E Group to offer a more comprehensive service, ranging from early-stage innovation to final execution and manufacturing. Listeners will gain insights into the status of the printed circuit board (PCB) industry, how I2E Group has succeeded by focusing on "high contact" projects, where they can protect customers' intellectual property and meet stringent quality standards for industries like medical, aerospace, and defense, the challenges of sourcing raw components, and the continued growth of domestic manufacturing. LINKS NCMEP | IES | I2E Group ABOUT The North Carolina Manufacturing Extension Partnership (NCMEP) NCMEP is the official state representative of the Hollings Manufacturing Extension Partnership (MEP), a program of the U.S. Department of Commerce's National Institute of Standards and Technology (NIST). The MEP National Network is a unique public-private partnership that delivers comprehensive solutions to manufacturers, fueling growth and advancing U.S. manufacturing. NCMEP is administered by NC State University Industry Expansion Solutions and partners with the Economic Development Partnership of NC, the Polymers Center of Excellence, Manufacturing Solutions Center, Hangar6, University of North Carolina at Charlotte Industrial Solutions Lab, and NC State University Wilson College of Textiles to help manufacturing companies develop and maintain efficient operations that are well-positioned to grow profitably. NC State University Industry Expansion Solutions (IES) Through combined resources and collaboration efforts, NC State University Industry Expansion Solutions provides services that help manufacturers to: Expand Local and U.S. Supply Chain Vendor Relationships Access Customized Training Programs to Narrow the Workforce Gap Realize the Efficiencies of Smart Manufacturing and Advanced Technology Save Time and Energy through Improved Processes, Productivity and Capacity Expand Facility and Equipment Capabilities Increase Sales and Profits Create and Retain Jobs Streamline New Product Design, Testing, Development and Time to Market Dr. Phil Mintz Dr. Phil Mintz is the executive director of NC State Industry Expansion Solutions (IES) and director of the North Carolina Manufacturing Extension Partnership (NCMEP). Phil drives outreach to NC manufacturers, builds relationships with federal and state leaders, and coordinates efforts to drive profitable manufacturing growth in the state. He also leads the broader IES Extension Operations outreach unit of regional managers, technical specialists, and business development leaders, providing business engagement, assessment, and improvement tools. This includes statewide peer networks, ISO 9000 quality management systems, Six Sigma, Lean manufacturing, environmental services, and health and safety solutions. John Weir John Weir is the Founder and Chief Executive Officer of i2E Group, LLC, based in High Point, North Carolina. With a career in manufacturing that began in 1993, he brings more than three decades of expertise in engineering, product development, and executive leadership. John earned his Bachelor of Science in Engineering and his Master of Business Administration from Cornell University, a foundation that has shaped his approach to innovative problem-solving and scalable manufacturing. Under his leadership, i2E Group has established itself as a trusted partner, supporting product design, prototyping, and low- to mid-volume electronics equipment production across diverse industries including aviation, life sciences, telecommunications, and defense.

United Public Radio
(REPEAT) S04E027- August 18, 2022 – Beyond The TinFoil Hat with Ryan Stacey – Micheal Boyd

United Public Radio

Play Episode Listen Later Sep 23, 2025 119:58


Michael E. Boyd Physicist, Engineer, and Archaeologist. In 1985 Mr. Boyd received his Bachelor of Science degree in Physics at UCSB. Mr. Boyd began his career as engineer/scientist starting in 1982 at Hughes Aircraft Company, Santa Barbara Research Center. His career has spanned component manufacturing development engineering in the medical device, microelectronics, telecommunication, semiconductor, and hard drive industry. Michael has published his research in technical publications including the International Society for Optical Engineering (SPIE), the National Institute of Standards and Technology (NIST), the Journal of Vacuum Science Technology, and the Society for California Archaeology. Mr. Boyd received an A.A. in Anthropology in 2019 and A.S. in Construction Management in 2021 from Cabrillo College in Aptos California. He began working as an Archaeologist in 2017. Mr. Boyd has three United States patents on the world's first spacetime metrics engineering device called the mass-spin-valve or gravitational rectifier; it is a type of gravitational diode. Mr. Boyd is a member of the International Society for Optics and Photonics (SPIE), the Society for California Archaeology, and the Santa Cruz Archaeology Society.

Analytically Speaking
Ep. 38: Being prepared isn't just for Boy Scouts

Analytically Speaking

Play Episode Listen Later Sep 8, 2025 62:27


Dr. Wilson is a research chemist and coordinator of the Cannabis Research Program in the Chemical Sciences Division at the National Institute of Standards & Technology (NIST) in Gaithersburg, Maryland. He received his B.S. degree in Chemistry from Greensboro College followed by a M.S. degree in Chemistry from the same institution. He then moved south to pursue a Ph.D. in Chemistry at the University of Central Florida, training in the lab of Prof. Andres D. Campiglia. In a wide-ranging conversation, we discuss the influence of 2000's television shows such as CSI on Brent's interest in forensic science and analytical chemistry, and how an informal interview at a poster session ultimately led to the position he now holds at NIST. Dr. Wilson shares how he navigated the educational landscapes in forensic science and chemistry, both at the undergraduate and graduate levels. We discuss the evolution of cannabis standards and analytical characterization in recent years, and Brent shares his perspective on the importance of standards in general, the birth of a reference material, and the significant effort it takes to bring these materials to the point where analytical scientists like us can purchase them. Dr. Wilson also describes some of his work on low-temperature emission spectroscopy techniques, where molecule exhibit much narrower and specific emission bands compared to room temperature detection. Brent also shares more about the life of a scientist within NIST, from day-to-day activities, competing for federal funding, and more. Finally, Dr. Wilson shares some professional advice, including the importance of being prepared and adaptable, the value of talking with people at conferences, and the importance of establishing and maintaining relationships over the course of one's career.

Software Engineering Institute (SEI) Podcast Series
Threat Modeling: Protecting Our Nation's Complex Software-Intensive Systems

Software Engineering Institute (SEI) Podcast Series

Play Episode Listen Later Sep 5, 2025 35:02


In response to Executive Order (EO) 14028, Improving the Nation's Cybersecurity, the National Institute of Standards and Technology (NIST) recommended 11 practices for software verification. Threat modeling is at the top of the list. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Natasha Shevchenko and Alex Vesey, both engineers with the SEI's CERT Division, sit down with Timothy Chick, technical manager of CERT's Applied Systems Group, to discuss how threat modeling can be used to protect software-intensive systems from attack. Specifically, they explore how threat models can guide system requirements, system design, and operational choices to identify and mitigate threats.  

Business of Tech
Cyber Budgets Shrink, GPT-5 Faces Backlash, FedRAMP Speeds Up, Vendors Squeeze MSPs

Business of Tech

Play Episode Listen Later Aug 13, 2025 17:47


The Cybersecurity and Infrastructure Security Agency (CISA) is facing significant criticism from state and local officials who feel abandoned due to diminishing federal support for critical cybersecurity programs. Many officials are concerned about their increasing reliance on self-driven initiatives, especially after cuts to the Multi-State Information Sharing and Analysis Center, which has been a crucial source of cybersecurity intelligence for over two decades. A recent survey revealed that a substantial portion of state and local governments lack adequate funding for cybersecurity, with 22% allocating no funds and 42% operating with annual budgets of less than $100,000. This situation raises alarms about the potential for increased vulnerability to cyberattacks, particularly from nation-state actors.In response to the evolving landscape of artificial intelligence, the National Institute of Standards and Technology (NIST) is developing new security guidance aimed at addressing the associated risks. This initiative will clarify how AI interacts with cybersecurity, focusing on securing AI systems, the adversarial use of AI, and leveraging AI to enhance cybersecurity measures. Additionally, a bipartisan bill known as the Validation and Evaluation for Trustworthy Artificial Intelligence Act has been reintroduced in the Senate, aiming to establish guidelines for the responsible development and testing of AI systems. House appropriators are also proposing a significant funding increase for NIST, reflecting a commitment to bolster cybersecurity and innovation.The Federal Risk Management and Authorization Program (FedRAMP) has made strides in streamlining the approval process for government cloud services, achieving a significant reduction in wait times from over a year to approximately five weeks. This shift is part of a broader trend toward more efficient cloud authorization processes, with FedRAMP already approving more than twice as many services in fiscal year 2025 compared to the previous year. This development presents an opportunity for businesses to leverage FedRAMP-authorized stacks for government-related buyers and to build migration strategies accordingly.OpenAI has recently updated its ChatGPT platform, introducing new models and third-party tool connectors while facing scrutiny over the performance and security of its latest model, GPT-5. Despite the introduction of various user-focused options, security assessments have revealed significant vulnerabilities in GPT-5, prompting concerns about its safety and reliability. As companies like ConnectWise implement new credit card surcharges and adjust their workforce in response to market demands, the overarching theme emphasizes the need for operational discipline and strategic planning in navigating the evolving technology landscape. Four things to know today 00:00 Shrinking Cyber Budgets, Emerging AI Rules, and Streamlined FedRAMP Signal Shifts for IT Providers06:43 From Security to SaaS Management, Vendors Roll Out Agentic Features for IT Service Providers10:25 OpenAI Expands GPT-5 Options, Adds Connectors, but Faces Early Security Backlash13:41 ConnectWise Adds Credit Card Surcharges, Trims Staff in Strategic Realignment  Supported by:  https://syncromsp.com/   Tell us about a newsletter!https://bit.ly/biztechnewsletter  All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

The Industrial Talk Podcast with Scott MacKenzie
James Soto with Industrial Strength Marketing

The Industrial Talk Podcast with Scott MacKenzie

Play Episode Listen Later Jul 30, 2025 34:47 Transcription Available


Industrial Talk is talking to James Soto, CEO at Industrial Strength Marketing about "Manufacturing resources for manufacturing success". Scott Mackenzie hosts James Soto on the Industrial Talk Podcast to discuss the Manufacturing Extension Partnership (MEP). Soto highlights the MEP's role in supporting small and medium-sized manufacturers through resources like Lean Six Sigma and addressing skilled labor gaps. He emphasizes the MEP's importance in reshoring and nearshoring efforts and its collaboration with universities and advanced manufacturing institutes. Soto notes funding challenges and the need for continued support to maintain the MEP's impact. He advocates for manufacturers to engage with the MEP for efficiency, funding, and innovation, stressing the network's irreplaceable value. Action Items [ ] Explore the MEP national network and find the center closest to your manufacturing business to understand the resources and services they offer. [ ] Advocate for continued funding and support of the MEP program by contacting your local representatives. [ ] Reach out to James Soto on LinkedIn to learn more about the MEP program and how to get involved. Outline Introduction and Purpose of the Podcast Scott MacKenzie introduces the Industrial Talk Podcast, emphasizing its focus on industry professionals and innovations. Scott thanks listeners for their support and highlights the bravery and innovation of industrial professionals. Scott introduces James Soto, a returning guest, and mentions their previous collaborations. Scott emphasizes the importance of amplifying one's message and being aggressive in communication. James Soto's Background and Passion for Manufacturing Scott MacKenzie praises James Soto's contributions to the manufacturing industry and his active presence on LinkedIn. James Soto expresses his love for manufacturing and acknowledges the excitement and uncertainty in the industry. Scott and James discuss the fluid nature of the manufacturing industry and the importance of reshoring and nearshoring. James highlights the role of people in manufacturing and their potential to change the world for the better. Introduction to the Manufacturing Extension Partnership (MEP) James Soto provides an overview of the Manufacturing Extension Partnership (MEP) and its centers across the country. He explains the MEP's affiliation with the National Institute of Standards and Technology (NIST) and its focus on advanced manufacturing. James shares his involvement with the MEP in launching Manufacturing Day and its efforts to attract the next generation of manufacturing workers. He emphasizes the MEP's role in meeting with manufacturers, especially small and medium-sized ones, to help them grow and create jobs. Challenges and Threats to the MEP James discusses the funding challenges and threats to the MEP, including the uncertainty around procurement and economic impact. He mentions the efforts to reverse defunding and the importance of telling the MEP's story to encourage representatives to fight for funding. Scott MacKenzie simplifies the premise for manufacturers, emphasizing the importance of the MEP as a resource for introducing new technologies and ensuring a resilient manufacturing business. James explains the MEP's prioritization process based on the distinct nature of different manufacturing environments and the need to

Clocking In: Voices of NC Manufacturing
E-66: From Classroom to Continuous Improvement: Clifton Dial's Journey in Manufacturing Leadership

Clocking In: Voices of NC Manufacturing

Play Episode Listen Later Jul 15, 2025 21:27


From Classroom to Continuous Improvement: Clifton Dial's Journey in Manufacturing Leadership. In this episode of Clocking In: Voices of NC Manufacturing, host Phil Mintz sits down with Dr. Clifton Dial, Operations Manager at WePack Logistics in Laurinburg, North Carolina. From a start in biology and education to a leadership role in manufacturing, Dr. Dial shares his unconventional career path and how his passion for leadership development and continuous improvement ultimately led him to WePack. WePack Logistics, a 2025 NC Manufacturing Leadership Award winner for Continuous Improvement, specializes in contract packaging, display assembly, and co-manufacturing services for major brands like Campbell's. Clifton discusses how his background in teaching and consulting shaped his leadership style, the challenges and opportunities of working in a seasonal operation, and how WePack is building a culture of efficiency and standardization to support long-term growth. Listeners will gain insights into leadership strategies, lean manufacturing practices, and the importance of investing in people and processes for sustainable manufacturing success. LINKS: NCMEP | We Pack Logistics ABOUT: The North Carolina Manufacturing Extension Partnership (NCMEP) NCMEP is the official state representative of the Hollings Manufacturing Extension Partnership (MEP), a program of the U.S. Department of Commerce's National Institute of Standards and Technology (NIST). The MEP National Network is a unique public-private partnership that delivers comprehensive solutions to manufacturers, fueling growth and advancing U.S. manufacturing. NCMEP is administered by NC State University Industry Expansion Solutions and partners with the Economic Development Partnership of NC, the Polymers Center of Excellence, Manufacturing Solutions Center, Hangar6, University of North Carolina at Charlotte Industrial Solutions Lab, and NC State University Wilson College of Textiles. to help manufacturing companies develop and maintain efficient operations that are well-positioned to grow profitably. Through combined resources and collaboration efforts, NCMEP provides solutions and services that help manufacturers to: › Expand Local and U.S. Supply Chain Vendor Relationships › Access Customized Training Programs to Narrow the Workforce Gap › Realize the Efficiencies of Smart Manufacturing and Advanced Technology › Save Time and Energy through Improved Processes, Productivity and Capacity › Expand Facility and Equipment Capabilities › Increase Sales and Profits › Create and Retain Jobs › Streamline New Product Design, Testing, Development and Time to Market Dr. Phil Mintz Dr. Phil Mintz is the executive director of NC State Industry Expansion Solutions (IES) and director of the North Carolina Manufacturing Extension Partnership (NCMEP). Phil drives outreach to NC manufacturers, builds relationships with federal and state leaders, and coordinates efforts to drive profitable manufacturing growth in the state. He also leads the broader IES Extension Operations outreach unit of regional managers, technical specialists, and business development leaders, providing business engagement, assessment, and improvement tools. This includes statewide peer networks, ISO 9000 quality management systems, Six Sigma, Lean manufacturing, environmental services, and health and safety solutions. Dr. Clifton Dial Dr. Clifton Dial is Operations Manager at We Pack Logistics, located in Scotland County, North Carolina.   Dial's primary focus at We Pack Logistics is to improve efficiencies and build a culture of continuous improvement through training and development of people and processes. Dial has earned a Ph.D. in Organizational Leadership and holds several certifications in lean manufacturing and leadership development. As an organizational consultant, Dial has over 12 years of experience in training and development, focusing on leadership and continuous improvement, specifically in manufacturing, warehousing, and distribution companies across North Carolina.  Before joining the We Pack Team, Clifton served as the lead trainer and curriculum developer for Dial Ventures LLC, where he provided customized leadership and continuous improvement training to over 100 industries across the state.  

Cybersecurity Where You Are
Episode 141: A Human-Centered Take on Password Policies

Cybersecurity Where You Are

Play Episode Listen Later Jun 25, 2025 43:18


In episode 141 of Cybersecurity Where You Are, Tony Sager is joined by Phyllis Lee, VP of SBP Content Development at the Center for Internet Security®(CIS®); and Julie Haney, Computer Scientist & Human-Centered Cybersecurity Researcher at the National Institute of Standards and Technology (NIST). Together, they use a human-centered understanding of security to discuss password policies, including their benefits, drawbacks, and efficacy. Here are some highlights from our episode:01:03. Introductions to Phyllis and Julie03:34. How "human-centered cybersecurity" goes beyond just usability05:35. The use of NIST and other authoritative sources to dispel confusion in cybersecurity09:09. How password policies positively and negatively impact human behavior15:06. Three anecdotes that showcase the importance of context when enacting security policy21:49. The process of using NIST SP 800-63 to recommend password security best practices27:11. Our changing understanding of "the human element"29:23. The need to do cybersecurity awareness training "right" and measure its effectiveness31:30. Recognition of the absence of natural systems thinking in cybersecurity33:14. Psychological safety, feedback, and trust as foundations of security culture39:03. Human touchpoints as a starting point to help usability and security work togetherResourcesCIS Password Policy GuideNIST SP 800-63 Digital Identity GuidelinesEpisode 98: Transparency as a Tool to Combat Insider ThreatsEpisode 110: How Security Culture and Corporate Culture MeshWhy Employee Cybersecurity Awareness Training Is ImportantIf you have some feedback or an idea for an upcoming episode of Cybersecurity Where You Are, let us know by emailing podcast@cisecurity.org.

Strong Homes, Safe Families!
Overturning Myths and Exploring Advancements in Tornado Resilience

Strong Homes, Safe Families!

Play Episode Listen Later May 28, 2025 40:38


In this episode, FLASH President and CEO Leslie Chapman Henderson discusses the importance of wind science and building resilience with Dr. Tanya Brown-Giammanco and Dr. Marc Levitan from the National Institute of Standards and Technology (NIST). They explore personal journeys into wind science, the evolution of tornado safety design, and the differences between tornadoes and hurricanes. The conversation highlights the vulnerabilities in home structures, particularly roofs and garage doors, and emphasizes the need for updated building codes and community involvement in safety measures. Learn things you may not know with these two engaging national experts as they dispel tornado myths and share practical steps for homeowners.Discussion TopicsPersonal Journeys into Wind Science (1:04)Understanding Tornado Safety and Dual-Objective-Based Tornado Design Philosophy (3:53)Differences Between Tornadoes and Hurricanes (8:50)Assessing Building Performance After Wind Events (11:42)Vulnerabilities in Home Structures in Regard to High Winds (16:08)Surprising Findings in Wind Engineering (23:03)Future Directions for Garage Door Safety (27:33)Elevating Garage Door Performance through Rating (30:15)Advancing Building Codes via Community Engagement (30:53)Resources ⁠Tornado-Strong.orgNational Institute of Standards and TechnologyUnderstanding Building Codes and StandardsDisaster and Failure Studies ProgramNew Tornado Resistant Building CodesFEMA/NIST Fact Sheet - Improving Windstorm and Tornado Resilience: Recommendations for One- and Two-Family Residential Structures⁠New Strong Homes Scale - InspectToProtect.orgThe Enhanced Fujita Scale  Checklist - Strengthen Your Garage Door  Checklist - Strengthen Your Roof  Checklist - Strengthen Your Gutters Checklist - Sealed Roof Decks ConnectDr. Tanya Brown-GiammancoLeslie Chapman-HendersonDr. Marc Levitan

Analytically Speaking
Ep. 36: A Day in the Life of a NIST Scientist

Analytically Speaking

Play Episode Listen Later May 14, 2025 49:43


In this episode, podcast co-hosts Dr. Dwight Stoll and Dr. James Grinias talk with Dr. Alix Rodowa, Research Chemist within the Organic Chemical Metrology Group at the National Institute of Standards & Technology (NIST) in Gaithersburg, Maryland. At NIST, she is the Environmental Sector Task Lead for the Organic Analysis Working Group for the Consultative Committee for Amount of Substance: Metrology in Chemistry and Biology (or CCQM). After discussing some of the events that sparked Dr. Rodowa's interest in science, and analytical chemistry in particular, we discuss her path to a career as a NIST scientist, including cold-emailing potential research advisors, and an experience as a National Research Council (NRC) postdoctoral fellow. We then discuss her work on polyfluoroalkyl substances (PFAS), including the development of the PFAS Interference List - affectionately known as the “PIL” - and the development of a Standard Reference Material (SRM) for that research area. We also touch on emerging uses of machine learning in workflows for analytical target and suspect screening. Finally, Alix provides some insight into a day in the life of a NIST scientist, why she enjoys working in a government laboratory, and how aspiring scientists can explore this environment as a potential career option.

Metrology Today Podcast
Metrology Today Podcast S4E3: Rob Knake, NIST

Metrology Today Podcast

Play Episode Listen Later Apr 30, 2025 74:08


Rob Knake is a professional specializing in quality systems, metrology, and standards development. He is actively employed with the National Institute of Standards and Technology (NIST) and involved with NCSL International, where he contributes to training, technical exchanges, and the advancement of measurement science. With expertise in ISO/IEC 17025, measurement traceability, and laboratory accreditation, Rob frequently leads seminars and workshops aimed at enhancing metrology practices. His roles encompass coaching, public speaking, and organizational leadership, focusing on improving quality systems and fostering collaboration within the metrology community. Rob's professional endeavors are highlighted through his active participation in events like the NCSL International Technical Exchange and the MSC Annual Training Symposium. His contributions have been recognized in various capacities, including hosting sessions and delivering presentations on metrology and digitalization topics. For more detailed information about Rob Knake's professional background and contributions, you can visit his LinkedIn profile.

Manufacturing Happy Hour
BONUS: MEPs are at Risk of Losing Funding and Need Your Help

Manufacturing Happy Hour

Play Episode Listen Later Apr 21, 2025 41:26


Today's bonus episode is all about MEPs, and actually a very urgent issue related to MEPs. For context, the Manufacturing Extension Partnership (MEP) is a public-private partnership that delivers comprehensive, proven solutions by helping small and medium-sized manufacturers grow, make operational improvements, and reduce risk.To put it in more simplified terms - MEPs provide resources to small- and medium-sized manufacturers that allow them to adopt new technology, upskill and train their people, and ultimately create jobs in their area. Every state has one, they go by different names in different states, and it was recently announced that this program was being defunded.Specifically, funding for 10 state MEP initiatives expired at the end of March, and the government's controlling agency, the National Institute of Standards and Technology (NIST), chose not to renew them. This is a moving target, it could change (as it already has once by extending the deadline to the end of the fiscal year), and quite frankly manufacturers don't know what's going to happen. It hasn't been communicated as to why this cut is taking place, but the reality is right now is there is a concern across the manufacturing community that funding for the entire MEP initiative - across all 50 states - might get cut.As a result of this action, a number of manufacturing podcasters got together to discuss the situation and actions that you, as manufacturers, can take to have your voices heard and say "This is ridiculous. My MEP has helped my business and community succeed for XYZ reason." We cannot afford to lose a critical resource like this that so many small- to mid-sized manufacturers rely on. All this an more in today's episode.

Cybercrime Magazine Podcast
Quantum Minute. Post-Quantum Encryption: NIST Picks HQC. Sponsored by Applied Quantum.

Cybercrime Magazine Podcast

Play Episode Listen Later Apr 17, 2025 1:57


The U.S. National Institute of Standards and Technology (NIST) has selected the Hamming Quasi-Cyclic (HQC) algorithm as a backup post-quantum encryption standard, adding a fifth quantum-resistant tool to its lineup of post quantum cryptography (PQC) standards. Unlike the primary standard ML-KEM – which is based on a complex type of multi-dimensional modelling called lattice mathematics – HQC uses code-based cryptography, offering an alternative defense in case future quantum breakthroughs threaten the integrity of lattice-based systems. HQC emerged from NIST's fourth round of evaluation, where it outperformed similar candidates like BIKE and Classic McEliece due to its strong security and practical performance. You can listen to all of the Quantum Minute episodes at QuantumMinute.com. The Quantum Minute is brought to you by Applied Quantum, a leading consultancy and solutions provider specializing in quantum computing, quantum cryptography, quantum communication, and quantum AI. Learn more at https://AppliedQuantum.com.

The Future of ERP
Episode 56: Quantum Apocalypse and Cybersecurity with SAP's Christian Cohrs

The Future of ERP

Play Episode Listen Later Feb 26, 2025 25:45


As quantum computing advances, experts warn of an impending "quantum apocalypse" that could jeopardize current encryption methods. With roots tracing back to the 1990s, this threat highlights the urgent need for organizations to adopt quantum-safe cryptography. While significant technological hurdles remain, the potential for quantum attacks on sensitive data looms large. Experts emphasize the urgency of transitioning to quantum-safe cryptography to protect sensitive data from future threats, particularly as attackers may collect encrypted information now for later decryption. The National Institute of Standards and Technology (NIST) is advocating for organizations to phase out non-quantum-safe cryptography by 2035, underscoring the need for immediate action in the face of evolving quantum capabilities.

Breaking Math Podcast
What is Measurement?

Breaking Math Podcast

Play Episode Listen Later Feb 18, 2025 7:12


SummaryThis episode of Breaking Math explores the fundamental concept of measurement, its importance in daily life, and the necessity for standardized units. The discussion highlights the role of the International System of Units (SI) and the National Institute of Standards and Technology (NIST) in maintaining measurement accuracy. It also touches on historical measurement failures and the evolution of measurement definitions, emphasizing the future of measurement in technology and science.Subscribe to Breaking Math wherever you get your podcasts.Become a patron of Breaking Math for as little as a buck a monthFollow Breaking Math on Twitter, Instagram, LinkedIn, Website, YouTube, TikTokFollow Autumn on Twitter and InstagramFollow Gabe on Twitter.Become a guest hereemail: breakingmathpodcast@gmail.com

RIMScast
Data Privacy and Protection with CISA Chief Privacy Officer James Burd

RIMScast

Play Episode Listen Later Jan 28, 2025 43:19


Welcome to RIMScast. Your host is Justin Smulison, Business Content Manager at RIMS, the Risk and Insurance Management Society.   In this episode, Justin interviews CISA Chief Privacy Officer James Burd about data privacy and protection. Topics include how CISA protects agencies and critical infrastructure, how they responded to a recent data attack, and what risk professionals and data privacy professionals can work together to ensure their organization is resistant to data breaches.   Listen for actionable ideas to improve the cyber security at your organization. Key Takeaways: [:01] About RIMS and RIMScast. [:14] Public registration is open for RISKWORLD 2025! RIMS wants you to Engage Today and Embrace Tomorrow in Chicago from May 4th through May 7th. Register at RIMS.org/RISKWORLD and the link in this episode's show notes. [:32] About this episode. We will discuss data privacy with James Burd, the Chief Privacy Officer of The Cyber Infrastructure Security Agency (CISA) here in the U.S. [:58] RIMS-CRMP Workshops! On February 19th and 20th, a two-day virtual workshop for the RIMS-CRMP will be led by former RIMS President Chris Mandel and presented by the RIMS Greater Bluegrass Chapter, the 2024 RIMS Chapter of the Year. [1:20] The next RIMS-CRMP-FED exam course will be held from February 4th through the 6th, 2025. Links to these courses can be found through the Certification page of RIMS.org and this episode's show notes. [1:36] Virtual Workshops! Chris Hansen will return on February 11th and 12th to lead the two-day course “Claims Management”. Gail Kiyomura of The Art of Risk Consulting will host the “Fundamentals of Insurance” virtual workshop on February 19th and 20th, 2025. [1:59] On February 26th and 27th, Elise Farnham of Illumine Consulting will lead “Applying and Integrating ERM”. “Managing Data for ERM” will be hosted by Pat Saporito. That course starts on March 12th, 2025. [2:22] A link to the full schedule of virtual workshops can be found on the RIMS.org/education and RIMS.org/education/online-learning pages. A link is also in this episode's show notes. [2:34] The RIMS Legislative Summit 2025 is back! It will be held on March 19th and 20th in Washington, D.C. Join RIMS for two days of Congressional meetings, networking, and advocating on behalf of the risk management community. [2:51] This event is open for RIMS members only so if you're not a member, join now! Visit RIMS.org/advocacy for registration details. [3:02] Interview! It is Data Privacy Week here in the U.S., through January 31st. This is an annual effort to promote data privacy awareness and education. Its events are sponsored by the National Cybersecurity Alliance. This week's theme is Take Control of Your Data. [3:23] Here to discuss how to take control of your data, and the best practices that risk professionals and business leaders need to know, is Chief Privacy Officer of CISA, James Burd. [3:36] James is the senior agency leader responsible for managing and overseeing CISA's privacy, external civil rights, civil liberties, and transparency programs. [3:46] We're going to talk about some of the big events that made headlines in late December and early January around cybersecurity and data privacy and the frameworks and strategies that risk professionals can implement to take control of their data. [4:02] CISA Chief Privacy Officer James Burd, welcome to RIMScast! [4:18] James has a fantastic team of privacy, transparency, and access professionals who provide transparency to the American public while integrating full privacy rights, liberties, and protections into the management of a safe, secure, and resilient infrastructure. [4:48] As Chief Privacy Officer, James Burd's primary responsibility is to ensure that privacy is at the forefront and integrated into every initiative, program, and policy CISA undertakes, regardless of whether it's by policy, process, or technical solutions. [5:00] This includes ensuring compliance with Federal privacy laws and embedding privacy considerations in the agency's operations and partnerships. [5:08] Protecting critical infrastructure inherently involves safeguarding sensitive and critical information that any organization holds, whether it's CISA or any of the many stakeholders of CISA. Privacy and cybersecurity are inherently interconnected. [5:21] CISA ensures its cybersecurity programs focus on protecting systems, networks, and data from unauthorized access while the privacy portion ensures that personal and sensitive data are handled responsibly, ethically, and securely. [5:39] What are the keys to a strong cybersecurity strategy? [5:52] The work CISA does in the privacy world is to ensure that the information CISA is holding is secure and safeguarded and also to tell the public how exactly they do that. [6:14] In the early days of CISA, it was a Computer Emergency Readiness Team (CERT). CERTs respond to major cybersecurity incidents at a state, local, national, or international level. A cybersecurity incident in the U.S. is similar to a cybersecurity incident in any nation. [6:50] All nations are facing the same cybersecurity issues. CISA's international work is about information sharing and helping each other understand what threats we all face. [7:19] Integrating privacy into risk management frameworks is a core consideration. A lot of the privacy work CISA does with risk managers is for ERM, identifying privacy risks and impacts and ensuring that mitigation strategies align with goals. [7:42] Risk managers are key partners in implementing strong data governance practices. CISA works with them to establish policies for data handling, access, and usage that align with the security needs and privacy protection of an agency or organization. [7:56] Risk managers have the opportunity to help privacy officers identify a privacy problem or privacy risk all across the organization. That's part of the risk manager's job as a point person. [9:13] CISA wants to do this privacy protection work with organizations before a breach. Many privacy professionals have learned the hard way that if you don't collaborate up front, you have to collaborate later, as a result of your emergency. That's not a great day. [9:29] Risk professionals have different viewpoints to consider. They may see that some privacy risks overlap with some financial risks, depending on the risk owner's point of view. It doesn't make sense to solve the same problem in 10 different ways. [10:30] The National Institute of Standards and Technology (NIST) is a valuable partner of CISA's. NIST can see what works or doesn't work as a conceptual or technical framework. NIST studies a problem from several angles and gives CISA an effective solution for the framework. [11:23] Daniel Elliott of NIST has been on RIMScast. James has collaborated with Daniel. [11:49] CISA is a collaborative agency. It does not exist without its partners and stakeholders. When NIST facilitates conversations between CISA and other stakeholders, it helps CISA figure out, of all the problems in the world, which critical problem we need to solve right now. [12:17] CISA has Cyber Performance Goals or CPGs, which are a subset of the NIST Cybersecurity Framework. CISA will tell a small business that they should start with the CPG and get it right, and then expand to everything else. [12:38] CPGs are not a substitute for a risk management framework, but they are a starting point. The CPGs would not exist if not for the work NIST had done in talking to small, medium, and large businesses and figuring out all the different issues they face. [13:08] In December, Chinese cyber attackers infiltrated U.S. agencies. When there is a major incident like that, there is a whole-government response. CISA plays an important role in that response, like a firefighter. Law enforcement plays the role of investigator. [14:16] CISA and its interagency partners are heavily involved in responding to recent Chinese activity associated with both Salt Typhoon and Volt Typhoon. They've been working very closely with the Treasury Department to understand and mitigate the impacts of the recent incident.  [14:35] There's no indication that any other Federal agency has been impacted by the incident but CISA continues to monitor the situation and coordinate with other authorities, like the FBI, to ensure that there's a comprehensive response. [14:50] The security of federal systems and data is of critical importance to national security. CISA is working aggressively to safeguard any further impacts. The People's Republic of China is a persistent threat, specifically, the GRC and related entities, who perform these activities. [15:12] They're one of the most persistent and strategically sophisticated adversaries we face in cyberspace today. The PRC has decades of experience in conducting rampant cyber espionage against U.S. businesses and critical infrastructure. [15:26] CISA has become increasingly concerned over the last year that the PRC is not just doing espionage but is trying to burrow into the critical infrastructure for a rainy day. These state-sponsored activities are coming from campaigns like Volt Typhoon and Salt Typhoon. [15:45] What happened to Treasury provides a stark example of these types of tactics. These tactics target critical infrastructure such as telecommunications, aviation, water, and energy. [15:56] Their goal, as far as we can tell, is not to cause immediate damage but to gain persistent access to those systems and remain undetected until they want to do something. [16:08] CISA has been very involved, not just responding to these incidents, but deeply studying these incidents to understand what is happening and what we need to do as a government and nation to protect ourselves from these burrowing activities. [16:27] Plug Time! RIMS Webinars! Resolver will be joining us on February 6th to discuss “4 Themes Shaping the Future of GRC in 2025”. [16:39] HUB International continues its Ready for Tomorrow Series with RIMS. On February 20th, they will host “Ready for the Unexpected? Strategies for Property Valuation, Disaster Recovery and Business Continuity in 2025”. [16:55] More webinars will be announced soon and added to the RIMS.org/webinars page. Go there to register. Registration is complimentary for RIMS members. [17:07] Nominations are also open for the Donald M. Stuart Award which recognizes excellence in risk management in Canada. Links are in this episode's show notes. [17:20] Let's Return to My Interview with James Burd of the Cyber Infrastructure Security Agency!   [17:42] Whether talking about AI, IoT, or 5G, the issues are hardware problems and software problems. [18:02] The issues of the 1970s are similar to the issues of the 2020s, regarding vulnerabilities, exposure, and unsafe practices when developing software and hardware. [18:20] What we're seeing in the emerging technology space with AI, IoT, and 5G is an increase in the volume and velocity of data. The improvement of technology in this space is based on power and efficiency. Software improvement is based on the reach of interconnectivity. [18:34] Privacy and cybersecurity risks do not just appear. We're seeing existing risks and issues increasing in size and complexity. What we previously thought of as a perceived risk is now a real risk, thanks to advances in computational power and the amount of data available. [18:54] It's always been a risk but it was less likely to occur until this point where there's more data, more volume, and more complexity. AI systems rely on a vast amount of personal data, raising concerns about data security, algorithmic bias, and a lack of transparency. [19:11] We've heard about these risks with machine learning and big data databases. They require governance frameworks that address how data is collected, stored, and used in systems, or, in this case, AI models. [19:28] Those frameworks should be familiar to anyone working in the data protection space or the risk management space for the last three decades. Insurers getting into the cybersecurity space have been paying stark attention to this. [19:58] We've found out that IoT devices are probably the easiest and most risky entrance points within networks into homes and critical infrastructure devices. The biggest risks they create are unauthorized access, data breaches, and potential surveillance. [20:19] These are not new risks. They're existing risks that are promulgated because of the new avenue to get in. It used to be that the worst thing that could happen to an IoT device like a router is that it gets compromised and becomes part of a botnet to take down websites. [20:38] Today, that still happens, but that IoT device is looked at as the back door for entering someone's network if it's not properly secured. [20:49] In itself, 5G is awesome. There are fantastic things to do with increased data flow. With increased speed and connectivity come the ability to move more data at a time and we're facing data being transferred in an insecure manner. People don't know what data they're sharing. [21:15] We're running into the same classic issues but they're exacerbated by something we view as a major success, access. Access should be celebrated but we shouldn't open doors because we can open them. We need to be able to make sure those doors are secured. [21:48] James paraphrases Mark Groman, a privacy expert formerly with the FTC. “Privacy and cybersecurity are sometimes viewed as competing priorities. They are two sides of the same coin. I refuse to live in a world where you compromise security for privacy or vice versa.” [22:11] We live in a world where you can have both. The great thing about advancing technologies is that we can do both. Both cybersecurity and privacy aim to protect sensitive data and systems, just from slightly different angles and for different reasons. [22:31] There has to be a collaborative approach between cybersecurity and privacy. An intermediary like a risk professional can help cybersecurity and privacy teams work together. [22:41] By leveraging things privacy-preserving technologies and designing privacy into cybersecurity measures, organizations can bridge the gap and achieve harmony between the two essential functions. This strengthens the organization and its overall risk management. [22:58] When a risk is realized in one area, it's common for it to be a harmonious risk with another risk in a different area. In the privacy and cybersecurity space, risks overlap often. Conflicts between cybersecurity and privacy are easily bridged. [23:24] Cybersecurity professionals want to collect more data; privacy professionals want you to minimize the amount of data you collect. [23:34] Cybersecurity relies on extensive data collection to detect, monitor, and respond to threats. Privacy wants to collect only what's necessary and maintain it for a minimum time. [23:46] Security monitoring tools like intrusion detection systems may gather logs or metadata that could include personal data, creating potential privacy risks, especially for an insider threat. [24:00] Organizations can implement privacy-aware cybersecurity solutions that anonymize or pseudo-anonymize data where possible, allowing cybersecurity professionals to get to the root of the problem they're trying to solve while masking sensitive data. [24:13] If you're investigating an insider threat, you can unmask the data. Do you need that data to do the job that you're tasked to do? If not, why run the risk of inappropriately accessing it? [24:53] Privacy frameworks will always encourage transparency about data usage and sharing, especially by private entities doing consumer business and handling personal information. [25:07] The public needs to know what you are collecting from them, how you are using it, and whether are you sharing it. They need to know if you are handling their data securely. [25:38] James would tell cybersecurity professionals that if they think obscurity is security, they should find another job. Obscurity is typically the worst way to secure things. [25:51] There are ways to describe how data is being held or secured by an organization without compromising the cybersecurity tools or techniques used to monitor or look for vulnerabilities. [26:03] Transparency can be maintained without compromising security and can be used in a way to assure the public that an organization is keeping serious security techniques in mind when handling the public's data. James tells how to share that message with the public. [27:08] When James opens software, he reads the Third Party Agreements. He knows most people don't. Government agencies include a plain language version of the agreement. Some private companies are doing the same to help people understand how their data is being used. [28:40] Quick Break for RIMS Plugs! The first of hopefully many RIMS Texas Regional Conferences will be held in San Antonio from August 4th through August 6th, 2025. [28:58] This groundbreaking event is set to unite the Texas RIMS Chapters and welcome risk management professionals from around the world! Also known as the Risk Management Roundup in San Antonio, you can join as a speaker!  [29:11] The Conference planning committee is interested in submissions that explore technology and cyber risk, workforce protection and advancement, energy and sustainability, extreme weather, construction, restaurant, retail, hospitality, and other trending now sessions. [29:28] The deadline to submit your proposal is Monday, February 24th. The link to the event and the submission process is in this episode's show notes. Go check it out! [29:39] The Spencer Educational Foundation's goal to help build a talent pipeline of risk management and insurance professionals is achieved in part by its collaboration with risk management and insurance educators across the U.S. and Canada. [29:58] Since 2010, Spencer has awarded over $3.3 million in general grants to support over 130 student-centered experiential learning initiatives at universities and RMI non-profits. Spencer's 2026 application process will open on May 1st, 2025, and close on July 30th, 2025. [30:20] General grant awardees are typically notified at the end of October. Learn more about Spencer's general grants through the Programs tab at SpencerEd.org. [30:30] Let's Return to the Conclusion of My Interview with the Chief Privacy Officer of CISA, James Burd! [31:00] A lot of ERM frameworks exist because they were required by regulation or law. [31:10] Privacy professionals are starting to see the same risks that risk management and compliance professionals have been dealing with for decades. The big tools that privacy professionals use are called Data Privacy Impact Assessments (DPIA). [31:29] DPIAs vary, depending on the regulatory framework or law. DPIAs do two things: they identify what data assets you have and they examine the risks that are associated with the handling of those data assets and what mitigations must be in place to buy down those risks. [31:48] That assessment can populate half of an ERM framework's register. Getting involved with your privacy program manager as they do these DPIAs may first cause the privacy program manager to resist your risk assessment, but a risk in one space is a risk in another space. [32:21] The DPIA is a valuable source of information for a risk manager. You can see the risks earlier. You can identify with the privacy program manager what some of the major risks might become. That means both realized and unrealized risks, which are equally important. [33:06] A privacy program manager will be preoccupied with a lot of the perceived risks. A risk manager wants to know which risks are more likely and identify them early. [33:40] A likelihood assessment will help the privacy officer identify how many “calories” to spend on this risk. The risk manager and privacy manager have a mutually beneficial relationship. They help each other. [34:17] CISA provides cybersecurity education, news on vulnerabilities and cyber threats, threat intelligence, and service to critical infrastructure providers once there is an incident of some sort. The CISA website shows cyber threat indicators of what a compromise might look like. [35:40] CISA has found novel patterns on networks that make it hard to tell that your network has been compromised. CISA calls those things “Left of Doom.” On the “RIght of Doom,” CISA prioritizes the incidents that it responds to. [36:02] CISA focuses primarily on critical infrastructure. If you have a situation CISA cannot respond to, they will assist you by a local field office to find the people to help you, whether it's law enforcement, local cyber security service providers, or a local Emergency Response Team. [37:03] Companies are involved in the California wildfires. Could an incident like that distract them that they might become susceptible to data breaches? James notes that you can't address every problem at the same time. Prioritize, rack, and stack. [37:17] Incidents are going to happen. CISA asks agencies and companies to take the time and spend the resources to knock out all the low-hanging fruit. The great majority of incidents CISA sees are bad actors exploiting very simple, easy-to-fix vulnerabilities. [37:55] It might be companies not using encrypted traffic, or only using a password to secure access to a server. The fix is relatively low cost or low impact. It takes time to figure out how to do the fix, but you'll be grateful that you took the time and spent the money to implement it. [38:24] The cost of a greater fix from the breach of a simple vulnerability will be far greater than the resources you'd spend to address it in the first place. Establishing that floor will help you focus on other “fires” that pop up while assuring you won't get “popped” for a silly reason. [38:49] If somebody's going to get you, make sure they've tried their hardest to get you. [38:58] It's Data Privacy Day today, as this episode is released! It's the start of Data Privacy Week! The theme is Take Control of Your Data!  [39:22] Robust privacy governance tips: Figure out where your data asset inventory is for your organization. Keep track of it and keep track of the risk associated with each data asset, Each data asset may have a different set of risks. [39:47] Every organization should maintain a comprehensive inventory of data assets, detailing what data is collected, where it is stored, who has access to it, and how it's used. [39:56] The risk professional probably isn't the one who takes the inventory, but they should have access to it and they should be evaluating that inventory.  [40:06] The risk professional can help the privacy manager by helping them establish clear policies and procedures for handling data, access control, and breach response, based on real risk. A privacy officer sometimes has difficulty identifying a real risk over a perceived risk. [40:23] By focusing on real risks, you avoid the problem where privacy officers spend too much energy coming up with solutions for the most unlikely scenarios, leaving organizations unprepared for what's likely to happen. [40:42] Special thanks again to James Burd of CISA for joining us here on RIMScast! There are lots of links about Data Privacy Day and Data Privacy Week in this episode's show notes. [40:54] Also see links to RIMS Risk Management magazine coverage of data privacy through the years and links to some RIMScast episodes that touch upon the topic. Be sure to tune into last week's episode with Tod Eberle of the Shadowserver Foundation on cyber risk trends of 2025! [41:18] More RIMS Plugs! You can sponsor a RIMScast episode for this, our weekly show, or a dedicated episode. Links to sponsored episodes are in our show notes. [41:47] RIMScast has a global audience of risk and insurance professionals, legal professionals, students, business leaders, C-Suite executives, and more. Let's collaborate and help you reach them! Contact pd@rims.org for more information. [42:05] Become a RIMS member and get access to the tools, thought leadership, and network you need to succeed. Visit RIMS.org/membership or email membershipdept@RIMS.org for more information. [42:23] Risk Knowledge is the RIMS searchable content library that provides relevant information for today's risk professionals. Materials include RIMS executive reports, survey findings, contributed articles, industry research, benchmarking data, and more.  [42:39] For the best reporting on the profession of risk management, read Risk Management Magazine at RMMagazine.com. It is written and published by the best minds in risk management. [42:53] Justin Smulison is the Business Content Manager at RIMS. You can email Justin at Content@RIMS.org. [43:00] Thank you all for your continued support and engagement on social media channels! We appreciate all your kind words. Listen every week! Stay safe!   Mentioned in this Episode: RIMS Risk Management magazine RISKWORLD 2025 — May 4-7. | Register today! RIMS Legislative Summit — March 19‒20, 2025 Cyber Infrastructure Security Agency National Cybersecurity Alliance | Data Privacy Week 2025 Nominations for the Donald M. Stuart Award Spencer Educational Foundation — General Grants 2026 — Application Dates RIMS-Certified Risk Management Professional (RIMS-CRMP) RISK PAC | RIMS Advocacy RIMS Texas Regional Conference 2025 | Submit an Educational Session by Feb. 24. RIMS Webinars: RIMS.org/Webinars “4 Themes Shaping the Future of GRC in 2025” | Sponsored by Resolver | Feb. 6, 2025 “Ready for the Unexpected? Strategies for Property Valuation, Disaster Recovery and Business Continuity in 2025” | Sponsored by Hub International | Feb. 20, 2025   Upcoming RIMS-CRMP Prep Virtual Workshops: “Stay Competitive with the RIMS-CRMP” | Presented by the RIMS Greater Bluegrass Chapter February 19‒20, 2025 | Instructor: Chris Mandel Full RIMS-CRMP Prep Course Schedule Upcoming Virtual Workshops: “Claims Management” | February 11‒12, 2025 | Instructor: Chris Hansen “Fundamentals of Insurance” | Feb. 19‒20, 2025 | Instructor: Gail Kiyomura “Applying and Integrating ERM” | Feb. 26‒27, 2025 | Instructor: Elise Farnham “Managing Data for ERM” | March 12, 2025 | Instructor: Pat Saporito See the full calendar of RIMS Virtual Workshops RIMS-CRMP Prep Workshops   Upcoming RIMS-CRMP Prep Virtual Workshops: “Stay Competitive with the RIMS-CRMP | Presented by the RIMS Greater Bluegrass Chapter” February 19‒20, 2025 | Instructor: Chris Mandel Full RIMS-CRMP Prep Course Schedule Full RIMS-CRMP Prep Course Schedule   Related RIMScast Episodes: “Cyberrisk Trends in 2025 with Shadowserver Alliance Director Tod Eberle” “Kicking off 2025 with RIMS CEO Gary LaBranche” “Year In Risk 2024 with Morgan O'Rourke and Hilary Tuttle” “AI and Regulatory Risk Trends with Caroline Shleifer” “Cybersecurity Awareness and Risk Frameworks with Daniel Eliot of NIST” (2024) “Cybersecurity and Insurance Outlook 2023 with Josephine Wolff”   Sponsored RIMScast Episodes: “Simplifying the Challenges of OSHA Recordkeeping” | Sponsored by Medcor “Risk Management in a Changing World: A Deep Dive into AXA's 2024 Future Risks Report” | Sponsored by AXA XL “How Insurance Builds Resilience Against An Active Assailant Attack” | Sponsored by Merrill Herzog “Third-Party and Cyber Risk Management Tips” | Sponsored by Alliant “RMIS Innovation with Archer” | Sponsored by Archer “Navigating Commercial Property Risks with Captives” | Sponsored by Zurich “Breaking Down Silos: AXA XL's New Approach to Casualty Insurance”| Sponsored by AXA XL “Weathering Today's Property Claims Management Challenges” | Sponsored by AXA XL “Storm Prep 2024: The Growing Impact of Convective Storms and Hail” | Sponsored by Global Risk Consultants, a TÜV SÜD Company “Partnering Against Cyberrisk” | Sponsored by AXA XL “Harnessing the Power of Data and Analytics for Effective Risk Management” | Sponsored by Marsh “Accident Prevention — The Winning Formula For Construction and Insurance” | Sponsored by Otoos “Platinum Protection: Underwriting and Risk Engineering's Role in Protecting Commercial Properties” | Sponsored by AXA XL “Elevating RMIS — The Archer Way” | Sponsored by Archer “Alliant's P&C Outlook For 2024” | Sponsored by Alliant “Why Subrogation is the New Arbitration” | Sponsored by Fleet Response “Cyclone Season: Proactive Preparation for Loss Minimization” | Sponsored by Prudent Insurance Brokers Ltd. “Subrogation and the Competitive Advantage” | Sponsored by Fleet Response   RIMS Publications, Content, and Links: RIMS Membership — Whether you are a new member or need to transition, be a part of the global risk management community! RIMS Virtual Workshops On-Demand Webinars RIMS-Certified Risk Management Professional (RIMS-CRMP) RISK PAC | RIMS Advocacy RIMS Strategic & Enterprise Risk Center RIMS-CRMP Stories — Featuring RIMS Vice President Manny Padilla!   RIMS Events, Education, and Services: RIMS Risk Maturity Model®   Sponsor RIMScast: Contact sales@rims.org or pd@rims.org for more information.   Want to Learn More? Keep up with the podcast on RIMS.org, and listen on Spotify and Apple Podcasts.   Have a question or suggestion? Email: Content@rims.org.   Join the Conversation! Follow @RIMSorg on Facebook, Twitter, and LinkedIn.   About our guest: James Burd, Chief Privacy Officer, Cyber Infrastructure Security Agency (CISA)   Production and engineering provided by Podfly.  

Translating Proteomics
Combating the Reproducibility Crisis in Computational Proteomics

Translating Proteomics

Play Episode Listen Later Jan 22, 2025 28:48 Transcription Available


On this episode of Translating Proteomics, co-hosts Parag Mallick and Andreas Huhmer of Nautilus Biotechnology discuss the reproducibility crisis in biology and specifically focus on how we can enhance reproducibility in computational proteomics. Key topics they cover include:• What the reproducibility crisis is• Factors that make it difficult to replicate multiomics research• Steps we can take to make biology research more reproducibleChapters 00:00 – 01:20 – Introduction01:20– 03:10 – What is reproducibility in research and why is it important?03:10 – 05:42 – Recent work from the Mallick Lab focused on computational proteomics reproducibility05:42 – 09:32 – Ways to help improve reproducibility in computational proteomics – More detailed documentation, moving beyond papers as our main form of documentation, and ensuring computational workflows are available,09:32 – 11:30 – Why Parag got interested reproducibility – Attempts to build AI layers on top of current workflows11:30 – 14:00 – The need to create repositories of analytical workflows codified in a structured way that AI can learn from14:00 – 15:24 – A role for dedicated data curators15:24 – 18:31 – Moving beyond the idea of study endpoints and recognizing data as part of a larger whole18:31 – 21:32 – How does AI fit into the continuous analysis and incorporation of new datasets21:32 – 23:36 – The role of AI in helping researchers design experiments23:36 – 27:25 – Three things we can do today to increase the reproducibility of computational proteomics experiments:· Be clear about the stated hypothesis· Document analyses through workflow engines and containerized workflows· Advocate for support for funding for reproducibility and reproducibility tools27:25 – End – OutroResourcesParag's Gilbert S. Omenn Computational Proteomics Award Lectureo In this lecture, Parag describes his vision for a more reproducible future in proteomicsNature Special on “Challenges in irreproducible research”o A list of articles and perspective pieces discussing the “reproducibility crisis” in researchWhy Most Published Research Findings Are False (Ioannidis 2005)o Article outlining many of the issues that make it difficult to reproduce research findingsReproducibility Project: Cancer Biologyo eLife initiative investigating reproducibility in preclinical cancer researchCenter for Open Science Preregistration Initiativeo Resources for preregistering a hypothesis as part of a studyNational Institute of Standards and Technology (NIST)o US government agency that aims to...

The Huddle: Conversations with the Diabetes Care Team
Person-Centered Technology: Embracing the Use of AI in Diabetes Care with Sheetal Shah

The Huddle: Conversations with the Diabetes Care Team

Play Episode Listen Later Jan 14, 2025 26:20


On our latest episode of The Huddle, Sheetal Shah, founder of MettaHealth Partners discusses the evolving realm of AI, the role DCESs and other health care professionals can play in embracing and adopting AI technology, and the importance of keeping a human element in the technology.Learn more about MettaHealth Partners here: MettaHealth PartnersLearn more about the National Institute of Standards and Technology (NIST) here: National Institute of Standards and TechnologyStay up to date on all things related to diabetes technology on danatech: Diabetes technology for healthcare professionals | Danatech Listen to more episodes of The Huddle at adces.org/perspectives/the-huddle-podcast.Learn more about ADCES and the many benefits of membership at adces.org/join.

FLIP THIS RISK™️ Podcast
Practicing Enterprise Risk Management in CHIPS Manufacturing

FLIP THIS RISK™️ Podcast

Play Episode Listen Later Jan 6, 2025 26:52


Dr. Karen Hardy speaks with Clio Grillakis about the practice of Enterprise Risk Management within the CHiPs Semiconductor Manufacturing Program at the National Institutes of Standards and Technology (NIST). *An interview clarification: "the United States produces 10% of all semiconductors, not just leading-edge semi-conductors."

Startcast | Der Innovations, Business & Marketing Podcast
#285 IWC Schaffhausen | Zeit für Innovation | Dr. Lorenz Brunner | Department Manager Research & Innovation

Startcast | Der Innovations, Business & Marketing Podcast

Play Episode Listen Later Jan 4, 2025 65:17


#285 IWC Schaffhausen | Zeit für Innovation | Dr. Lorenz Brunner | Department Manager Research & InnovationWie ein Materialwissenschaftler die Zukunft der Luxusuhren schmiedetIn dieser faszinierenden Episode des Startcast Podcasts taucht Host Max Ostermeier in die Welt von Dr. Lorenz Brunner ein, dem Department Manager Research & Innovation bei IWC Schaffhausen. Von seinen Anfängen als Werkstoffingenieur an der ETH Zürich bis hin zur Revolutionierung der Luxusuhrenwelt - Lorenz teilt seine außergewöhnliche Reise mit einer Begeisterung, die ansteckend ist.Höre, wie Lorenz den Spagat zwischen Wissenschaft und Handwerkskunst meistert. Als ehemaliger Gastforscher am National Institute of Standards and Technology (NIST) und jetziger Innovationstreiber bei IWC bringt er frischen Wind in die oft als traditionell geltende Uhrenindustrie. Erfahre, wie seine Leidenschaft für Materialforschung zur Entwicklung bahnbrechender Technologien wie Ceratanium® führte - ein Material, das die Vorteile von Titan und Keramik vereint.Tauche ein in Lorenz' Gedankenwelt, wenn er über die Herausforderungen bei der Entwicklung leuchtender Keramikuhren oder der Schaffung des präzisesten Mondphasenmoduls der Welt spricht. Wie schafft er es, die Grenzen des technisch Machbaren immer weiter zu verschieben und dabei die DNA von IWC zu bewahren?Diese Episode ist ein Muss für jeden Uhrenliebhaber und Technik-Enthusiasten. Lorenz teilt exklusive Einblicke in die Zusammenarbeit mit dem Deutschen Zentrum für Luft- und Raumfahrt (DLR) und erklärt, wie die Entwicklung von Uhrengehäusen aus keramischem Faserverbundwerkstoff (CMC) sogar zur Verbesserung von Satellitenantriebssystemen beiträgt.Lass dich inspirieren von Lorenz' unermüdlichem Forscherdrang und seiner Vision, die Uhrmacherkunst ins 21. Jahrhundert zu katapultieren. Erfahre, wie er und sein Team 22 Billionen Kombinationen von Zahnrädern durchrechneten, um den ersten säkularen ewigen Kalender zu erschaffen - eine Uhr, die theoretisch für die nächsten 11.700 Jahre genau geht.Von der Entwicklung farbiger Keramiken für die "Top Gun"-Kollektion bis hin zur Schaffung eines revolutionären Stoßabsorptionssystems - diese Episode bietet dir einen ungeschminkten Blick hinter die Kulissen der Uhreninnovation.Schnall dich an für eine Achterbahnfahrt durch die Höhen und Tiefen einer der faszinierendsten Karrieren der Schweizer Uhrenindustrie. Lorenz nimmt kein Blatt vor den Mund, wenn er über seine Visionen, Herausforderungen und die Zukunft der Zeitmessung spricht.Diese Episode ist deine Chance, einen der innovativsten Köpfe der Branche hautnah zu erleben. Tauche ein in Dr. Lorenz Brunners Welt, wo Wissenschaft auf Handwerkskunst trifft und jede Uhr eine technologische Meisterleistung ist. Lass dich von seiner Energie und seinem Innovationsgeist mitreißen und entdecke, was es wirklich bedeutet, die Zeit neu zu definieren.Citations:[1] https://ch.linkedin.com/in/lorenz-brunner-2419a7193[2] https://chapter.digital/aus-gemeinsamem-antrieb/[3] https://press.iwc.com/de/iwc-and-dlr-fibre-reinforced-ceramics-watch-cases-and-new-applications-in-space-de/[4] https://www.xing.com/profile/Lorenz_Brunner[5] https://www.google.de/policies/faq[6] https://www.watchtime.net/brands/iwc/iwc-ceralume-lewis-hamilton[7] https://www.leaders-network.de/veranstaltungen/details/online-rundgang-spektakulaerer-blick-hinter-die-kulissen-des-iwc-schaffhausen-manufakturzentrums-design-zum-greifen-nah[8] https://www.watchonista.com/articles/interviews/behind-scenes-iwcs-lorenz-brunner-birth-portugieser-eternal-calendar[9] https://open.spotify.com/episode/2bm0D4Qi1Qcks7H1IzteDl[10] https://www.iwc.com/en/journal/continued-innovation.html Get bonus content on Patreon Hosted on Acast. See acast.com/privacy for more information.

The Gate 15 Podcast Channel
Weekly Security Sprint EP 92. CEO attack, disrupted attacks, and cybersecurity warnings

The Gate 15 Podcast Channel

Play Episode Listen Later Dec 10, 2024 27:27


In the latest episode of the Security Sprint, Dave and Andy covered the following topics: Warm Start: H2OEx - An Exercise for the Water Sector   Main Topics: UHC Assassination: ·      Health insurers step up security, scrub websites of leadership information ·      Luigi Mangione, suspect in fatal shooting of UnitedHealthcare CEO Brian Thompson, used ghost gun that may have been 3D-printed ·      Suspect in killing of health care CEO faces 5 charges including forgery and firearm without a license ·      Health care CEO shooting suspect was Ivy League graduate who appears to have written about Unabomber online ·      Suspect in fatal shooting of UnitedHealthcare CEO Brian Thompson ID'd as Luigi Mangione, an ex-Ivy League student ·      Luigi Mangione's sprawling family found success after patriarch's rise ·      Health insurers step up security, scrub websites of leadership information ·      UnitedHealth CEO says insurer will continue to prevent ‘unnecessary care' in leaked video as sick trolls warn, ‘Dude's next' ·      What Companies Should Be Asking Their Security Teams Right Now ·      A timeline of the fatal shooting of UnitedHealthcare CEO Brian Thompson and search for his killer ·      UnitedHealth CEO's killing unleashes social media rage against insurers ·      UnitedHealthcare CEO kept a low public profile. Then he was shot to death in New York ·      Bullets fired at healthcare CEO in fatal shooting had words carved on them ·      Message on bullets fired by healthcare CEO's assassin bear eerie link to book condemning insurance companies ·      Copycat, Contagion, and the Robin Hood Effect as Risk Enhancers in Targeted Violence   Faith-Based Threats ·      Terror attack on Bavarian Christmas market foiled by police ·      Man in van filled with explosives, guns intended to attack a North Texas church, report states ·      FeatherRiver School of Seventh-Day Adventists Shooting: o  2 kindergarteners wounded and gunman dead after shooting at California religious school ·      Five-Eyes security and law enforcement agencies release joint authored analysis of youth radicalization & PDF analysis.   Six password takeaways from the updated NIST cybersecurity framework. Password security is changing — and updated guidelines from the National Institute of Standards and Technology (NIST) reject outdated practices in favor of more effective protections.    Quick Hits: ·      FBI IC3 PSA: Criminals Use Generative Artificial Intelligence to Facilitate Financial Fraud ·      Russian Woman Arrested In U.S. For Alleged Ties To Russian Intelligence ·      NGA: 2024 State Experts Roundtable On Protecting Energy Infrastructure From Physical Attacks ·      Manager of Chatham County Company Charged with Skimming Hundreds of Thousands of Dollars From Employer with Fake Invoices ·      The California tsunami danger is real. The 7.0 earthquake is wake-up call to prepare. o  'Swaying back and forth': Magnitude 7 earthquake, aftershocks rock California o  Tsunami warning canceled after strong California earthquake Salt Typhoon: o  White House says at least 8 US telecom firms, dozens of nations impacted by China hacking campaign o  FCC chair proposes cybersecurity rules in response to China's Salt Typhoon telecom hack   Health: o  What is mystery 'disease x' and why have dozens died in DR Congo? o  Unknown disease kills 143 in southwest Congo, local authorities say o  FINAL REPORT: COVID Select Concludes 2-Year Investigation, Issues 500+ Page Final Report on Lessons Learned and the Path Forward ·      Korea arrests CEO for adding DDoS feature to satellite receivers ·      Outraged? You're more likely to share misinformation, study finds ·      Romania hit by major election influence campaign and Russian cyber-attacks ·      EU orders TikTok to freeze Romanian elections data ·      Choosing secure and verifiable technologies ·      CISA Releases New Public Version of CDM Data Model Document

Irish Tech News Audio Articles
Integrity360 launches Managed ASM to address complex attack surfaces and strengthen cyber resilience

Irish Tech News Audio Articles

Play Episode Listen Later Dec 3, 2024 5:41


Integrity360, one of the leading pan-European cyber security specialists, has announced the launch of its new Managed ASM service designed to address the growing complexities of securing diverse environments, including IT (Information Technology), Operational Technology (OT) and Internet of Things (IoT). The Attack Surface Management (ASM) service provides complete visibility into an organisation's attack surface, enabling proactive risk reduction, exposure management, and threat detection to safeguard critical assets. The attack surface is expanding at an unprecedented rate, with the number of connected assets worldwide expected to grow by an additional 50 billion devices by 2030. This surge, driven by the adoption of IoT, OT, and other connected technologies, has created new opportunities for cyber attackers to exploit poorly secured assets. Integrity360's Managed ASM enables organisations to discover, prioritise, and remediate risks before they can be exploited. According to Gartner, organisations prioritising continuous threat exposure management (CTEM) will be three times less likely to suffer a breach by 2026, highlighting the critical importance of the ASM service. Powered by the Armis Centrix Cyber Exposure Management (CEM) Platform, Integrity360's Managed ASM leverages advanced automation and AI to discover and monitor all assets, identify exposures, and provide actionable recommendations for remediation. "Integrity360's Managed ASM provides organisations with a complete, end-to-end attack surface management solution," said Jamie Andrews, Senior Director of International Partners at Armis. "By leveraging our platform's AI-driven intelligence alongside Integrity360's expert management and remediation services, businesses can stay ahead of evolving threats and maintain a proactive security posture across even the most complex environments." According to the National Institute of Standards and Technology (NIST), an organisation's attack surface includes every point where an attacker can enter or extract data from a system spanning internal and external assets. Recent incidents, such as attacks targeting IoT-connected industrial devices, illustrate how adversaries chain exposures to access or disrupt critical systems or sensitive data. With attack surfaces expanding across multiple infrastructures and a 140% increase in cyberattacks targeting critical infrastructure over recent years, the Managed ASM service responds to the urgent need for comprehensive visibility and proactive management. The Managed ASM Service addresses several challenges faced by organisations, operating on a cyclical, continuous model to ensure constant improvement in security posture.* The Managed ASM Service is tailored to help organisations reduce cyber risk by ensuring complete visibility, prioritising critical exposures, and supporting remediation efforts. This approach is especially vital for industries such as manufacturing, healthcare, and utilities, where compromised IoT and OT systems can lead to significant operational and safety impacts and aligns with specific compliance requirements for these critical sectors. "Unlike traditional solutions that focus solely on IT infrastructure, Integrity360's Managed ASM extends its capabilities beyond IT to also include OT, IoT devices, and even specialised systems like medical devices. These often-overlooked areas represent some of the most vulnerable entry points for attackers," said Brian Martin, Director of Product Management, Integrity360. "What's seen can be managed and secured. By providing granular visibility and continuous monitoring of the full attack surface, the service enables organisations to identify hidden risks across their entire environment and take proactive steps to address them." Integrity360's Managed ASM emphasises the importance of collaboration through fortnightly customer review calls and provides transparency, enabling organisations to assess risk trends, review performa...

The Good Trouble Show with Matt Ford
Pentagon / Lockheed Martin UAP / UFO Detection Tech In Civilian Hands

The Good Trouble Show with Matt Ford

Play Episode Listen Later Nov 25, 2024 79:22


In this episode of The Good Trouble Show with Matt Ford, physicist / electrical engineer Mitch Randall demonstrates a radar system for detecting UAPs / UFOs that can be deployed by the public, bypassing Pentagon classification rules. The tech is called Passive Bistatics and is a distributed UFO detection system with multi-sensor data and provenance. It's designed to distinguish instantaneous acceleration - something humans can't do. This tech will be globally revealed for the first time so anyone can develop the tech. The sensor platform is based on a Lockheed Martin radar system that detects ballistic missiles and other airborne targets and, of course, UAP / UFO.Follow or Contact Mitch Randall through: Twitter/X: @realityseaker Web: https://www.ascendantai.com/skywatch.Mitch Randall, MSEE, MS Phys, began building scientific instrumentation and research radars in 1984. He joined the National Center for Atmospheric Research (NCAR) in 1989 where he developed airborne, ground-based, and mobile scientific weather research radars. Randall pioneered Software Defined Radio (SDR) techniques and deployed them in NCAR, NASA, and NOAA radars. He developed a software-based Dopplerization technique for incoherent magnetron radars to create the Doppler On Wheels (DOW) tornado-chasing trucks, upon which was formed the Center for Severe Weather Research in Boulder, CO. His technologies became the industry standard for the meteorological weather radar community in the mid 90s. Working for the National Institute of Standards and Technology (NIST) in 2010, Randall developed a millimeter wave channel sounder to characterize real-world cell communications, used to develop today's 5G networks. Randall co-founded Binet in the 90s to bring passive radar tech to weather radars. Randall co-founded Advanced Radar Corporation in the 2000's. In 2005 Randall co-founded WildCharge and licensed his wireless charging technology Duracell. This invention was featured in TIME magazine's "Best Inventions of 2007" issue. Randall is a prolific inventor with licensed toys currently on the market. Randall co-founded Ascendant Artificial Intelligence (AAI), a consulting firm developing custom AI and consumer electronics. In 2021 Randall became a Research Team member of Harvard's Galileo Project, where he developed and deployed the proof of concept SkyWatch passive radar. Randall is the lead author of the paper describing the system in the Journal of Astronomical Instrumentation.The Good Trouble Show: Linktree:  https://linktr.ee/thegoodtroubleshowPatreon: https://www.patreon.com/TheGoodTroubleShow YouTube: https://www.youtube.com/@TheGoodTroubleShow Twitter / X: https://twitter.com/GoodTroubleShow Instagram: @goodtroubleshow TikTok: https://www.tiktok.com/@goodtroubleshow Facebook: https://www.facebook.com/The-Good-Trouble-Show-With-Matt-Ford-106009712211646Threads:  @TheGoodTroubleShowBlueSky: @TheGoodTroubleShowBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-good-trouble-show-with-matt-ford--5808897/support.

Diverse
Ep 288: CHIPS Act Update With Dr. Laurie E. Locascio of the U.S. Department of Commerce

Diverse

Play Episode Listen Later Nov 12, 2024 34:44


Dr. Laurie E. Locascio, U.S. Under Secretary of Commerce for Standards and Technology and director of the National Institute of Standards and Technology (NIST), reflects on the implementation of the bipartisan CHIPS and Science Act which appropriated over $52 billion for semiconductor manufacturing, research and development, and workforce training and education. In conversation with Karen Horting, executive director and CEO of the Society of Women Engineers, Dr. Locascio discusses how this legislation is shaping the future of the U.S. semiconductor industry and why organizations like SWE are essential to its success. Dr. Locascio shares insights on workforce development and efforts to increase the representation of women and underrepresented groups in STEM, including apprenticeships, upskilling, retraining, and returnships.

Practical AI
The path towards trustworthy AI

Practical AI

Play Episode Listen Later Oct 29, 2024 51:46


Elham Tabassi, the Chief AI Advisor at the U.S. National Institute of Standards & Technology (NIST), joins Chris for an enlightening discussion about the path towards trustworthy AI. Together they explore NIST's 'AI Risk Management Framework' (AI RMF) within the context of the White House's 'Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence'.

Changelog Master Feed
The path towards trustworthy AI (Practical AI #293)

Changelog Master Feed

Play Episode Listen Later Oct 29, 2024 51:46


Elham Tabassi, the Chief AI Advisor at the U.S. National Institute of Standards & Technology (NIST), joins Chris for an enlightening discussion about the path towards trustworthy AI. Together they explore NIST's 'AI Risk Management Framework' (AI RMF) within the context of the White House's 'Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence'.

Business of Tech
Cybersecurity Backlog, VMware Shift, Microsoft Price Hike, Apple AI Date, IT Leadership Report

Business of Tech

Play Episode Listen Later Oct 8, 2024 11:12


The National Institute of Standards and Technology (NIST) facces ongoing challenges regarding its backlog of security vulnerability reports. Despite some progress, NIST missed its September 30th deadline to restore processing speeds to pre-February levels, leaving over 17,000 Common Vulnerabilities and Exposures (CVEs) unprocessed. This backlog poses significant risks to organizations, as they may remain unaware of vulnerabilities that are actively being exploited. The episode highlights the importance of effective risk management in cybersecurity and encourages organizations to pressure vendors to participate in disclosure programs.The episode also delves into the rising concerns surrounding cloud security threats, which have become the top worry for executives, according to a recent PwC report. The report identifies hack and leak operations, third-party breaches, and ransomware as leading threats, with organizations feeling least prepared to address cloud attacks. Additionally, Microsoft has informed customers about a software bug that affected log data collection for key security products, emphasizing the need for robust security measures and incident response planning.Host Dave Sobel shifts focus to the impact of Broadcom's acquisition of VMware, which has led many users to explore alternatives like OpenStack. The latest version of OpenStack, codenamed Dalmatian, is experiencing a resurgence as former VMware users migrate to its platform, benefiting from improved tools and a stable ecosystem. Meanwhile, Microsoft has announced a 10% price increase for its System Center management tool set for 2025, raising questions about potential challenges for the product in the competitive landscape.Finally, the episode addresses the stagnation in IT leadership diversity, revealing concerning statistics from a recent survey. The data shows that 89.6% of IT leaders are white and 79% are male, with minimal changes from previous quarters. The Society for Human Resource Management's recent decision to remove equity from its diversity, equity, and inclusion strategy has sparked controversy, as critics argue it undermines commitments to fostering a diverse workplace. Sobel emphasizes the importance of gender diversity in IT, citing research that indicates diverse teams outperform homogeneous ones, ultimately enhancing business efficiency and customer satisfaction.Four things to know today00:00 NIST Faces Vulnerability Report Backlog as Cloud Threats Dominate Cybersecurity Concerns04:02 VMware Users Flock to OpenStack Amid Acquisition Uncertainty, While Microsoft Ups System Center Pricing for 2025 05:36 Apple Addresses macOS Sequoia Cybersecurity Bugs Ahead of Major AI Launch with iOS 18.106:38 IT Leadership Diversity Stagnates as DEI Efforts Face Scrutiny   Supported by:  https://www.huntress.com/mspradio/https://www.coreview.com/msp  Event: www.smbTechFest.com/Go/Sobel   All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social

Business of Tech
AI Budget Shifts, Cybersecurity Workforce Challenges, and Meta's AR Innovations

Business of Tech

Play Episode Listen Later Sep 30, 2024 10:36


Host Dave Sobel discusses the evolving landscape of IT budgets, emphasizing a significant shift towards AI and data modernization. Accenture's recent earnings call reveals that enterprises are reallocating their IT spending to focus on enhancing digital capabilities and workforce upskilling, rather than increasing overall budgets. This trend is underscored by Gartner's forecast that AI-enabled PCs will dominate global shipments, particularly in the consumer market, indicating a growing reliance on AI technologies.The episode also highlights a concerning slowdown in the cybersecurity workforce, which has seen only a marginal increase in professionals despite a persistent shortage of nearly 5 million workers. Sobel points out that U.S. cybersecurity employment has shrunk by nearly 5%, as employers prioritize revenue-generating roles over cybersecurity positions. This disconnect between the skills sought by hiring managers and those perceived as necessary by applicants calls for more learning opportunities and a focus on recruiting diverse talent to address the skills gap.In regulatory news, California Governor Gavin Newsom vetoed a strict AI regulation bill, opting instead to collaborate with academics to develop alternative guidelines. This decision reflects the ongoing debate surrounding AI safety and regulation, with Newsom arguing against singling out large AI models. Additionally, the National Institute of Standards and Technology (NIST) has revised its password guidelines, shifting the focus from complexity to length, which aims to improve user experience and security practices.Finally, Sobel discusses Meta's recent announcements from their Connect event, particularly the unveiling of their Orion AR glasses. While the glasses showcase advanced features like eye tracking and muscle-reading technology, their high production cost means they won't be available for mass production anytime soon. Meta's commitment to innovation in spatial computing positions them as a leader in the industry, potentially paving the way for a new computing paradigm that integrates AI with real-world awareness. The episode concludes with a reflection on the importance of adapting to these technological advancements and the implications for the future of work. Three things to know today 00:00 AI and Data Take Priority as IT Budgets Shift, Cyber Workforce Slows, and Skill Shortages Persist Across Tech Sectors03:58 AI Regulation Vetoed in California as NIST Shifts Password Policy Focus from Complexity to Length05:42 Meta Leads Spatial Computing Race with Orion AR Glasses and AI Innovations, Highlighting Long-Term Industry Shift   Supported by:  https://www.huntress.com/mspradio/http://blumira.com/radio/   Event: www.smbTechFest.com/Go/Sobel    All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social

GW Integrative Medicine
Improving Cannabis Science

GW Integrative Medicine

Play Episode Listen Later Sep 24, 2024 39:53


In the summer of 2024, the National Institute of Standards and Technology (NIST) released a Hemp Plant Reference Material to help labs accurately measure the amount of THC, CBD, toxic elements and other compounds in cannabis products. It will also help producers and state regulators ensure that cannabis products are safe to use and accurately labeled. Today, we're going to talk about NIST's Hemp Plant Reference Material and about improving cannabis science with leading experts in the field of cannabis medicine. Our guests are Dr. Bryon Adinoff, president of the Doctors for Drug Policy Reform, and Dr. Leslie Mendoza Temple, former Chair of the Medical Cannabis Advisory Board for the Illinois Department of Public Health. Dr. Adinoff is an addiction psychiatrist, neuroscientist, academician, and advocate. He was appointed Clinical Professor at the University of Colorado School of Medicine following his retirement as Distinguished Professor of Alcohol and Drug Abuse Research in the Department of Psychiatry at the University of Texas Southwestern Medical Center and as a psychiatrist for 30 years with the Department of Veterans Affairs. He has published over 200 papers and book chapters on the neurobiology and treatment of addiction and is Editor-in-Chief of The American Journal of Drug and Alcohol Abuse. Dr. Temple is a Clinical Associate Professor for NorthShore University HealthSystem's Department of Family Medicine and Medical Director of the NorthShore Integrative Medicine Program. She was recently appointed as an endowed Chair of Integrative Medicine by the Owen L. Coon Foundation. She is also a Clinical Associate Professor in Family Medicine at the University of Chicago Pritzker School of Medicine. ◘ Related Content NIST's New Hemp Reference Material Will Help Ensure Accurate Cannabis Measurements https://bit.ly/3XWruef NIST Tools for Cannabis Laboratory Quality Assurance https://bit.ly/3Bq0lau ◘ Transcript https://bit.ly/3THgP4F ◘ This podcast features the song “Follow Your Dreams” (freemusicarchive.org/music/Scott_Ho…ur_Dreams_1918) by Scott Holmes, available under a Creative Commons Attribution-Noncommercial (01https://creativecommons.org/licenses/by-nc/4.0/) license. ◘ Disclaimer: The content and information shared in GW Integrative Medicine is for educational purposes only and should not be taken as medical advice. The views and opinions expressed in GW Integrative Medicine represent the opinions of the host(s) and their guest(s). For medical advice, diagnosis, and/or treatment, please consult a medical professional.

GovCast
Identity Week: The Security and UX Standards That Power Digital Identity Programs

GovCast

Play Episode Listen Later Sep 12, 2024 17:39


In August, the National Institute of Standards and Technology (NIST) released a new draft of its Digital Identity Guidelines for the identity-proofing process. This covers technologies like digital wallets, passkeys and physical identification documents like REAL ID-compliant passports and drivers licenses. The draft outlines ways to boost privacy, accessibility and security during the identity-proofing process for those accessing government services and benefits. Ryan Galluzzo is the digital identity program lead at NIST. At Identity Week in Washington, D.C., he spoke about the guidelines, the interoperability work that powers these technologies, and the importance of balancing security and accessibility when implementing digital identity programs.

Metrology Today Podcast
Metrology Today Podcast S3E10: Georgia Harris - NIST Ret.

Metrology Today Podcast

Play Episode Listen Later Sep 12, 2024 78:58


Join us in this episode as we sit down with Georgia Harris, a seasoned expert with over 30 years of experience in U.S. Weights and Measures. Georgia's career includes 5 years with the State of Minnesota and an impressive 28 years at the National Institute of Standards and Technology (NIST), where she made significant contributions before her recent retirement. In our conversation, Georgia shares insights from her extensive career, including her pivotal role in evaluating and accrediting State weights and measures laboratories and her work ensuring accurate measurements for over 350,000 calibrations each year. She also discusses her involvement in training and proficiency testing for State metrologists and the development of key documentary standards for Weights and Measures field enforcement and laboratory activities. Georgia has not only presented and published widely across the U.S. but also on the global stage, including Canada, Mexico, South Africa, and Colombia. Her accolades include multiple best paper awards and notable honors such as the MSC Andrew J. Woodington Award, the NCSLI Education and Training Award, and the ASQ Measurement Quality Division Max J. Unis Award. She also served as a liaison to the Measurement Science Conference and held a long tenure on the NCSLI Board of Directors, including a term as President. Tune in to hear about her journey, her insights into the field of metrology, and her experiences from a distinguished career dedicated to advancing measurement science.

CiscoChat Podcast
Quantum Safe Cryptography

CiscoChat Podcast

Play Episode Listen Later Sep 4, 2024 39:29


Tune in to be in the know as Craig Hill, Mike Luken, and Andy Stewart explore the crucial role of quantum safe cryptography as we approach the quantum computing era and its potential impact on current encryption methods. Discover what you need to know and how Cisco is leading the way in delivering quantum safe cryptography. The discussion begins with an overview of the urgent need to migrate to post-quantum cryptography. In the U.S., Federal agencies have been mandated by National Security Memorandum 10 to transition their cryptographic systems to withstand quantum computing attacks by 2035. This directive, enforced by the President's Office, the Office of Management and Budget (OMB), and the Office of the National Cyber Director, aims to mitigate future risks posed by quantum computers. Globally, governments, financial institutions, hospitals, and other entities requiring secure information protection are also taking steps to incorporate quantum-safe cryptography. Although quantum computers capable of breaking current encryption do not yet exist, the National Institute of Standards and Technology (NIST), in collaboration with over 100 countries and experts, has recently released the first three finalized Post-Quantum Encryption Standards. Listen in as Craig, Mike, and Andy delve into the nuances, needs, and technical details of quantum safe cryptography, and learn how Cisco is preparing for the post-quantum world.

Bringing Chemistry to Life
The metrology aspects of PFAS

Bringing Chemistry to Life

Play Episode Listen Later Aug 21, 2024 33:55


Early in her career, Dr. Jessica Reiner realized that she cared more about ensuring the accuracy of the measurements she was making than making the measurements themselves. This realization, combined with experience in working with PFAS, led to her current role as Research Chemist at the National Institute of Standards and Technology (NIST).Join us to hear an insider's perspective on the PFAS topic, with a deep dive into the analytical methods used to detect, quantify, and identify PFAS species. Jessica and her team use LC-MS, anion exchange chromatography, and other orthogonal methods in their work and they focus on creating, validating, and maintaining reference materials (RM) and standard reference materials (SRM) that are used to help ensure that PFAS measurements are accurate and comparable with those made in other laboratories around the world. From challenges around defining a PFAS, to creating a stable, ultra-low concentration standard, to detecting ultra-high concentrations PFAS, Jessica provides an ace analytical chemist's perspective grounded in the metrology of it all.As always, and in addition to the great science, you'll get to learn about Jessica's personal career path, the ups and downs of her work, and hear her advice for career development. Related episodes: Season 4, Ep.2: The father of green chemistrySeason 2, Ep.7: Fresh urban waterSeason 1, Ep.3: There's chemistry in the air!Bonus content!Access bonus content curated by this episode's guest by visiting www.thermofisher.com/chemistry-podcast for links to recent publications, podcasts, books, videos and more.View the video of this episode on www.thermofisher.com/chemistry-podcast.A free thank you gift for our listeners! Request your free Bringing Chemistry to Life t-shirt on our episode website.Use code 0chemRcks in August, and BCTLisn3R in September. We read every email so please share your questions and feedback with us! Email helloBCTL@thermofisher.com

People Behind the Science Podcast - Stories from Scientists about Science, Life, Research, and Science Careers
771: Developing Tools, Terms, and Standards for Genome Editing - Dr. Samantha Maragh

People Behind the Science Podcast - Stories from Scientists about Science, Life, Research, and Science Careers

Play Episode Listen Later Jul 29, 2024 48:28


Dr. Samantha Maragh is Leader of the Genome Editing Program and Co-Leader of the Biomarker and Genomic Sciences Group at the U.S. National Institute of Standards and Technology (NIST). She also represents the U.S. as a technical expert on nucleic acid measurements for the International Standards Organization (ISO) Technical Committee on Biotechnology (ISO TC 276). Scientists at NIST work to develop controls and standards to make sure that measurements, tools, and all of the systems that rely on them are correct. Samantha's work focuses particularly on genome editing, which has a variety of applications, including new treatments for diseases, agriculture, and more. When she's not working, Samantha loves cooking and enjoying food, especially seafood. For her, cooking is like science, but even more flexible and creative. Some of her other favorite pastimes include singing at her church on Sundays and playing puzzle games like Best Fiends. Samantha received her B.S. degree in Biology with a specialization in Cellular & Molecular Biology and a minor in chemistry from Loyola University. She went on to get her M.S. degree in Biotechnology: Molecular Targets & Drug Discovery from Johns Hopkins University and her Ph.D. in Human Genetics & Molecular Biology from Johns Hopkins School of Medicine. In 2019, Samantha received the Outstanding Young Scientist Award from The State of Maryland, The Maryland Academy of Sciences, and the Maryland Science Center. She was also selected as the recipient of the George A. Uriano Award in 2021 for her success in building the NIST Genome Editing Consortium as a public-private partnership. In 2022 she received the Measurement Science Excellence Award from the NIST Material Measurement Laboratory for leading the development of the first international standard for the field of genome editing published in 2021 and deploying the first inter-laboratory study for the genome editing field. In this interview, she talks more about her life and science.

The Daily Scoop Podcast
Federal IT failures and AI initiatives in government

The Daily Scoop Podcast

Play Episode Listen Later Jul 23, 2024 24:43


In today's episode of the Daily Scoop Podcast, we delve into the ongoing impacts of the CrowdStrike IT failure. Last week's outage has left several federal agencies scrambling to restore services. At the U.S. Citizenship and Immigration Services, over 5,000 workstations were affected, though the agency's primary systems remain operational. The Organ Procurement and Transplantation Network also experienced disruptions but resolved issues within an hour. Further impacts were reported at the U.S. Patent and Trademark Office and the Department of Energy's Lawrence Berkeley National Lab. In legislative responses, House Homeland Security Committee Chairman Mark Green and Rep. Andrew Garbarino have requested CrowdStrike's CEO to testify regarding the outage's effects on federal operations. Additionally, the National Institute of Standards and Technology (NIST) is spearheading a new initiative to integrate artificial intelligence into manufacturing to enhance resilience. NIST plans to invest up to $70 million over five years in a new institute under Manufacturing USA, aiming to advance technology development, workforce education, and shared infrastructure. Wrapping up the episode, we revisit a panel discussion from the recent event, AWS Innovate Day, featuring Charles Worthington and Vinay Singh, the first chief AI officers at the Department of Veterans Affairs and the Department of Housing and Urban Development, respectively. They shared insights on the adoption of generative AI within federal agencies, emphasizing governance, risk management, and transparency. The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on on Apple Podcasts, Soundcloud, Spotify and YouTube.

Security Clearance Careers Podcast
CUI Rules for NIST

Security Clearance Careers Podcast

Play Episode Listen Later Jul 19, 2024 19:48


Controlled Unclassified Information (CUI) implementation and oversight is barreling toward government agencies and contractors alike. CUI aims to help companies better protect the numerous information that may be sensitive, but not classified. Victoria Pillitteri, manager of the security engineering and risk management group at the National Institute of Standards and Technology (NIST) joins the show to discuss CUI and new implementation guidance offered by NIST. Hosted on Acast. See acast.com/privacy for more information.

Tiny Matters
‘Beef snow,' sludge, and seafood fraud: How NIST standardizes everything from $1,143 peanut butter to house dust to keep us safe

Tiny Matters

Play Episode Listen Later Jun 26, 2024 30:04 Transcription Available


Send us a Text Message.Standard reference materials — or SRMs — at the National Institute of Standards and Technology (NIST) serve as standards for many food, beverage, health, industrial and other products. There are over a thousand SRMs including peanut butter, house dust, dry cat food, soy milk, blueberries, stainless steel, fertilizer, and a DNA profiling standard. SRMs help make products safer and ensure that consumers are getting what they think they're getting. But how do they work exactly?In this episode of Tiny Matters, Sam and Deboki cover SRMs that are helping us accurately detect toxic substances like lead and pesticides in our house dust, fight seafood fraud, and keep PFAS out of our meat. Sam also travels to the NIST headquarters outside of Washington, DC to get a behind the scenes tour of how SRMs are made. She even gets a chance to snoop around the warehouse where SRMs are stored.Email us your science stories/factoids/news that you want to share at tinymatters@acs.org for a chance to be featured on Tiny Show and Tell Us!Tiny Matters has a YouTube channel! Full-length audio episodes can be found here. And to see video of Sam, Deboki, and episode guests, check out Tiny Matters YouTube shorts here. A video showing 'beef snow' and a bunch of other SRMs is here.Links to the Tiny Show & Tell stories are here and here. Pick up a Tiny Matters mug here! All Tiny Matters transcripts are available here.

The Buzz with ACT-IAC
ICYMI: How NIST is Responding to AI Development

The Buzz with ACT-IAC

Play Episode Listen Later Jun 5, 2024 35:32


This week, The Buzz presents a session from ACT-IAC's 2024 Emerging Technology and Innovation Conference. The National Institute of Standards and Technology (NIST) is responsible for developing and issuing guidance around the standards and measurements we use in all kinds of technological development in the US. In the modern era, this includes Artificial Intelligence. Since the release of the AI Executive Order in October 2023, NIST has issued four draft publications intended to help improve the safety, security and trustworthiness of AI systems. In this fireside chat, Raymond Holder, VP for Digital Growth at Maximus Federal, talks more about this work with Dr. Charles Romine, Associate Director for Laboratory Programs at NIST. Subscribe on your favorite podcast platform to never miss an episode! For more from ACT-IAC, follow us on LinkedIn or visit http://www.actiac.org.Learn more about membership at https://www.actiac.org/join.Donate to ACT-IAC at https://actiac.org/donate.Intro/Outro Music: Focal Point/Young CommunityCourtesy of Epidemic Sound

Business of Tech
NIST Vulnerability Processing, Live Nation Breach, Open Data Formats, Cybersecurity Gender Disparity

Business of Tech

Play Episode Listen Later Jun 4, 2024 9:11


The National Institute of Standards and Technology (NIST) has taken steps to accelerate the processing of software and hardware vulnerabilities in the National Vulnerability Database by awarding a new contract to an outside vendor. This move aims to clear the backlog of unanalyzed vulnerabilities by the end of the fiscal year, demonstrating a commitment to cybersecurity.However, amidst this positive development, the closure of the Affordable Connectivity Program (ACP) poses a threat to internet access for nearly 60 million low-income Americans. The lack of funding has led to the discontinuation of the program, leaving many households in financial distress. Efforts to extend the program through bipartisan legislation have stalled, highlighting the importance of government support in ensuring equitable access to essential services.On the cybersecurity front, the dismantling of the 911 S5 proxy botnet, the world's largest, and the arrest of its administrator in Singapore, Yun-Hee Wang, showcases international efforts to combat cybercrime. The botnet, which conducted various illicit activities, underscores the ongoing challenges in cybersecurity and the need for robust measures to protect against such threats.Furthermore, the episode delves into the gender disparity in the cybersecurity workforce, with only 20-25% being female. Factors contributing to this gap include unconscious bias and a lack of female role models. The discussion emphasizes the importance of addressing these issues through strategies such as unconscious bias training, diversifying recruitment efforts, and providing support for women in cybersecurity roles to foster a more inclusive and diverse industry. Four things to know today00:00 NIST Accelerates Vulnerability Processing as ACP Closure Threatens Internet Access for Millions02:28 Live Nation Breach Highlights Growing Cybersecurity Concerns as 83% of Firms Plan Budget Increases04:11 Open Formats Transform Data Industry: Snowflake, Databricks, and the Future of Cloud Services05:26 CompTIA Data Highlights Cybersecurity Gender Disparity: Strategies for Recruitment and Retention Supported by:  https://coreview.com/msp/ All our Sponsors:   https://businessof.tech/sponsors/  Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social

Business of Tech
NIST Launches Gen AI Program and White House Updates Critical Infrastructure Oversight

Business of Tech

Play Episode Listen Later May 1, 2024 11:41


The National Institute of Standards and Technology (NIST) has recently launched the GenAI program with the goal of establishing benchmarks for generative AI technologies. This initiative is crucial for enhancing transparency in the AI field and ensuring the safe and reliable use of these technologies. The program will focus on evaluating generative AI technologies, releasing benchmarks, developing deepfake detection systems, and promoting the creation of software to identify the source of AI-generated information.In the podcast episode, it was highlighted that Microsoft, Google, and Amazon all experienced significant revenue growth in the first quarter of the year. Microsoft reported a 17% revenue growth, attributed to the momentum from CoPilot, its AI-powered chatbot. The growth rate remained steady compared to the previous quarter. Additionally, revenue from Activision, which Microsoft acquired in October, contributed to the overall growth. Azure Cloud Computing Service saw a 21% revenue growth, potentially boosted by new AI-powered services. Three things to know today00:00 NIST Launches GenAI Program to Set Benchmarks for Generative AI and Enhance Transparency03:50 White House Updates Critical Infrastructure Oversight with National Security Memorandum-2206:35 Microsoft, Google, and Amazon Leverage AI and Cloud for Substantial Q1 Revenue Growth  Supported by:  https://coreview.com/msp/https://skykick.com/mspradio/   All our Sponsors:   https://businessof.tech/sponsors/   Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social

Business of Tech
AI: 92% of Windows Machines in Large Organizations Not Ready, Push for Increased NIST Funding

Business of Tech

Play Episode Listen Later Apr 23, 2024 12:08


Organizations are currently facing a critical challenge in preparing for AI integration, as discussed in the podcast episode. A study has revealed that a staggering 92% of Windows machines in large organizations lack the necessary capabilities to effectively handle modern AI applications. This deficiency in AI readiness presents a significant obstacle for organizations seeking to leverage AI technologies to enhance their operations and maintain competitiveness in the digital landscape. There is a significant push for increased funding for the National Institute of Standards and Technology (NIST) to enhance AI safety oversight. Over 80 organizations, including leading AI companies, universities, and civil society groups such as Amazon, OpenAI, the ACLU, and MIT, are urging Congress to prioritize NIST's funding request of $47.7 million. This call for additional funding comes in response to years of funding challenges that have left NIST with limited resources and facilities, potentially jeopardizing its ability to oversee advanced AI systems effectively. Four things to know today00:00 As New Models Emerge, New Study Reveals 92% of Windows Machines in Large Organizations Are Not AI-Ready04:51 AI Leaders and Academics Push for Increased NIST Funding to Enhance AI Safety Oversight 07:10 Produce8 Introduces Advanced Work Analytics to Boost Efficiency in MSP Operations08:31 Google Partners with National Guard to Enhance Disaster Response with AI Technology Supported by:  https://atakama.com/mspradio/https://coreview.com/msp/   All our Sponsors:   https://businessof.tech/   Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social

The Ricochet Audio Network Superfeed
The Federalist Society's Teleforum: NIST's Proposed Framework for a New Approach to Bayh-Dole March-in: What You Need to Know

The Ricochet Audio Network Superfeed

Play Episode Listen Later Mar 12, 2024


The National Institute of Standards and Technology (NIST) seeks comments on the Draft Interagency Guidance Framework for Considering the Exercise of March-In Rights, which sets out the factors that an agency may consider when deciding whether to exercise Bayh-Dole march-in rights. The information received will inform NIST and the Interagency Working Group for Bayh-Dole (IAWGBD) […]