European Union regulation on the processing of personal data
POPULARITY
Categories
The modern automotive industry faces many new challenges, as vehicles evolve with more complex data requirements and supply chains become increasingly interconnected, major Original Equipment Manufacturers (OEMs) require certain Standards as a mark of trust from potential suppliers. Currently, this trust is codified in TISAX (Trusted Information Security Assessment Exchange). For businesses that have not previously dealt with Standards, TISAX can be seen as a daunting regulatory hurdle. However, a TISAX label is more than a compliance check, it's a recognised mark that your organisation has robust information security measures in place specific to the automotive industry, including considerations for protecting key intellectual property and prototype innovations. In this episode, Ian Battersby is joined by Emma Coxhill, isologist at Blackmores, to explore what TISAX is, who it applies to, what it requires and how OEM's and automotive suppliers can take their first steps towards earning a TISAX label. You'll learn · What is TISAX? · Who is TISAX applicable to? · Why is TISAX important? · What are the 3 assessment levels within TISAX? · What are the 3 different subject areas within TISAX? · How is TISAX implemented? · Why does TISAX use labels instead of certificates – and how can people verify these? · What is the ENX portal and how does this help with supplier onboarding? · Where should companies start if they want to earn a TISAX label? Resources · Register for our TISAX webinar here · ENX · Isologyhub In this episode, we talk about: [02:05] Episode Summary – Emma Coxhill joins Ian to dive into the topic of TISAX, including who it's applicable to, why it's important and how businesses can make a start on earning a TISAX label. [03:40] What is TISAX? TISAX was developed for the automotive industry by the German Association of the Automotive Industry, VDA, and it's managed by the ENX Association. It's based on the ISO 27001 Annex A controls, and was created for the automotive industry because they were looking to standardise the framework for assessing and sharing information security results between manufacturers and their suppliers. [04:40] Who is TISAX applicable to? While applicable to the automotive industry, it encompasses quite a lot of businesses within this. This is because is applies to any organisation that handles sensitive data relating to vehicle development, manufacture and marketing. So, this can include any company providing car parts, vehicle software, cloud services, testing labs, engineering etc. Basically, any service providers to OEMs (original equipment manufacturers) will be applicable. TISAX can also be applicable for those dealing with automotive related events, marketing and photography, as new models are protected IP and will require related business to prove that they have the correct security requirements to ensure any potential prototypes are protected. [06:50] Why is TISAX important? Mainly, it gives the automotive industry a trusted, standardised way to ensure information security across the entire supply chain. Without it, the OEMs and suppliers can conduct their own audits, but it'll be their own interpretations or what is considered an adequate level of security. The industry saw this as an open door to chaos, so TISAX was created to protect highly confidential automotive information and support compliance with relevant data protection laws. However, now it's not so much a 'nice to have' Standard as it is a requirement to trade, especially within Europe. It's fast becoming a tender requirement, and many OEMs won't make it past the procurement process without a valid TISAX label. The ENX portal, where labels are registered, can also help speed up the on-boarding process. So, the whole TISAX system has been built for ease of access to help manufacturers choose suppliers that prioritise information security. [09:00] What's the consequence of not having a TISAX label? A loss of opportunities. Those within the automotive industry that don't have a valid label will be seen as a security risk, leaving them at a competitive disadvantage. [10:30] What are the 3 levels within TISAX? Unlike ISO 27001, TISAX has levels that depend on the level of data sensitivity that you're dealing with. Level 1: Self-assessment – Considered as 'normal risk' with general processing of data. Level 2: Remote Audit – Applicable to those dealing with confidential information such as design documents or internal projects. This requires both a self-assessment and an audit. Level 3: On-site Assessment – Highly confidential information, so this applies to those dealing with sensitive research, development information or prototype data etc. This requires a physical on-site assessment, as the qualified TISAX auditor will need to ensure that you have the appropriate physical security measures in place. Most businesses will require level 2, but if you're looking to work with high-spec OEMs, then level 3 is more desirable. [12:00] What are the 3 subject areas within TISAX? The 3 main areas are as follows: Information Security: This covers general information security controls such as relevant policies, access controls, risk management, incident handling and secure operations. Prototype Protection: This focuses on safeguarding physical and digital prototypes, design data, test vehicles and confidential development information. Data Protection: This ensures proper handling of personal data in line with legal requirements such as GDPR. If you're just doing a self-assessment, you can pick the areas which are most relevant to you. If you've been requested to earn a TISAX label, they will usually provide you with their preference on subject areas. Many will opt to take information security, but data protection is also quite common. The prototype section is more specialist and not applicable to all businesses. [14:00] How is TISAX implemented? There are a few stages to gaining a TISAX label: Awareness – Learn the requirements for TISAX and planning for the project ahead. This may include asking your clients about what they expect of your from an information security perspective and working out costs for assessments and any additional support. The ENX website has a lot of really useful info, including a handbook and a copy of the self-assessment. Preparation – This is where you need to complete your TISAX scope and register yourself on the ENX portal. Your scope needs to specify your selected level (1,2 or 3) and the subject areas you'll be focusing on. You also need to include the locations within scope, which have to be listed one by one (not simply 'all offices in the UK' for example). Self-Assessment – The template for this can be downloaded from the ENX website. This is essentially a Gap Analysis that grades your current level of compliance with the TISAX requirements. It includes a scoring mechanism, where you'll be aiming to get a 2.71, as that's the pass rate. This self-assessment will highlight what gaps you need to fill before going ahead with an external assessment. Implementation – This is where you will bridge those gaps highlighted in the Self-assessment. This will involve creating the required documentation requested by TISAX and updating existing systems to align with requirements. Before going ahead with external assessments, we highly recommend you conduct some internal audits to ensure you're ready. External Assessment – Whether this is remote or on-site, you need an official TISAX auditor to perform the assessment. A list of approved TISAX auditors is available on the ENX portal, we recommend getting a few quotes to get the best price. We also recommend requesting a kick-off meeting so you can have a chat with your auditor about the requirements and how they'd like to review the required evidence of compliance. The Assessments are similar to that of an ISO certification, it's broken down into 2 segments. One is a document/evidence review and the other is done with both parties present to go through their findings, review further evidence and to question any gaps found. Again, similar to ISO, you may receive either minor non-conformities, non-conformities, opportunities for improvement or observations in their final report. If you get any non-conformities, you'll need to provide an action plan within 2 weeks following from your assessment to address them. You will then be allowed a few months to implement the corrections, which will be reviewed and approved by the auditor before receiving your label. If you only received opportunities for improvement then you'll get a label straight away. [20:40] Why does TISAX use labels instead of certificates – and how can people verify these? Taking ISO 27001 as a comparison, that certification has a blanket framework that can apply to every business. While you can exclude small bits, the vast majority applies to everyone. TISAX is more scaled based on the level of security you're dealing with. Businesses can pick both different levels and different subject areas for their Label. Another key difference is that Labels can only be verified through the ENX portal, this is where other TISAX clients can see who has what Label, including the details of level and selected subject areas. Business can still chose to state TISAX compliance on their website, but the details regarding the level of compliance only need to be seen be relevant individuals. [22:05] What is the ENX portal and how does this help with supplier onboarding? The ENX portal is accessible through the ENX website. It does require a fee to make an account, but this is where everything related to TISAX is managed. This is where you will upload your scope and findings and it's where Labels are assigned and documented for suppliers to search for. There are options for how much information you want to disclose within those public searches, allowing you to select the need for contacting for further information. The ENX portal can help massively in reducing the amount of supplier questionnaires you need to fill in, as those looking for automotive suppliers will simply look up your TISAX Label to verify if you have the required level of security to continue with the procurement process. [24:50] Where should companies start if they want to earn a TISAX label? If you're just diving in, we recommend you do some research first to fully understand what you're expected to do to earn a Label and how much the process will cost. Next you'll need to define your scope, so look at what sites need to be included and identify relevant client requirements in relation to TISAX. This is to ensure you're going for the right Level and subject areas. Next evaluate your internal resource for the project and related budget. As mentioned, you will need to pay to register on the ENX portal and you need to consider Assessment costs and any additional support costs should you need consultancy services. You'll also need to assign individuals to manage the project, which will include completing the self-assessment, updating your policies, procedures and documentation to align with the requirements and possibly conduct training if required. This isn't a 2 week project, realistic timescales will vary, but generally if you're starting from scratch you're looking at 9-12 months. If you have ISO 27001 in place already this could be reduced to 6-8 months. As with anything Standard related, leadership commitment is a big factor as you'll need their help and support to ensure the projects success. If you need additional help, reach out to consultants such as Blackmores to help guide you through the process. [28:05] Upcoming TISAX Webinar – Join us on the 18th March 2026 at 2pm for a webinar where we'll dive into TISAX further and provide practical guidance on how to complete the VDA Self-Assessment. Attendees will also get access to some freebies. So don't delay, register your place here today. We'd love to hear your views and comments about the ISO Show, here's how: ● Share the ISO Show on Twitter or Linkedin ● Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List
"Crystal Ball Marketing," a strategy centered on the "Precursor Effect." This concept involves identifying specific indicators or life events that predict exactly when a marketplace is most likely to need and buy a specific service. By targeting customers at these pivotal moments, businesses can significantly increase conversion rates with less sales effort. Key Takeaways The Precursor Effect Defined: Identifying a life event, calendar event, or business shift that occurs immediately before a customer requires your services. The Marathon Analogy: If you sell cold water at the finish line of a marathon, you don't need a clever sales pitch because the "precursor" (running a marathon) has already created an intense, immediate need. Transference: A precursor strategy that works in one industry (like targeting new movers) can often be successfully applied to another unrelated industry. Case Study: The "Moving" Strategy Frank shares a success story from an inner circle member in the professional services industry who helps people in physical pain: The Precursor: Moving into a new home is a physically demanding experience that often leads to physical pain. The Strategy: The client obtained a list of 540 people who had recently moved and sent them a 1.5-page letter offering a free initial service. The Investment: Approximately $1,000 for the list and mailing. The Results: 8 new customers acquired immediately. $2,500 in immediate cash collected. Over $14,000 in projected lifetime customer value (LTV) within the first year. Industry Examples of Precursors Legal Industry: The implementation of GDPR served as a massive precursor for lawyers to sell updated privacy policies. Home Services: Moving into or out of a home is a primary indicator that a homeowner will need maintenance or repair services. Dentistry: Halloween acts as a precursor for cavity checks due to high sugar consumption. Weight Loss: Holidays like Thanksgiving and Christmas are precursors for weight loss services as people tend to gain weight and seek a "reset" afterward. Action Steps Brainstorm: Spend a few minutes writing down every possible situation or event in a person's life that would make them want your service. Identify: Determine how you can find or "broker" a list of people who have just experienced those specific precursors. Execute: Create a targeted offer for those individuals while the need is at its peak.
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1We're back with another episode of Fantasy Life with Ian Hartitz and in today's episode Ian is joined by fantasy football expert Dwain "The Rock" McFarland to break down everything you need to know about the running back position heading into NFL free agency.This offseason's running back free agent class is historically deep — and where these players end up will completely reshape fantasy football drafts for 2026.We break down every RB that matters this offseason, from the headliners to the names flying under the radar. For each player, we cover what they did in 2025, the landing spots that make sense, and what it all means for your fantasy team next season.In today's episode: Are the Chiefs the best landing spot for any free agent RB? Will Kenneth Walker find a new home? Is Breece Hall the BEST free agent RB? And will he move on from the Jets? We're breaking down all this and so much more! Learn more about your ad choices. Visit megaphone.fm/adchoices
Vládny audit bol politickým zadaním no preukázal veľmi dobré výsledky občianského sektora. Reputačné škody ale budú obrovské, pre Aktuality to povedal Juraj Rizman z organizácie Post Bellum. Štát a jeho inštitúcie by boli veľmi radi, keby miera pochybenia pri ich vlastných projektoch bola iba pol percenta, dodáva. Ustojí Tretí sektor vládnu šikanu a prečo Juraj Rizman zažaloval Luboša Blahu?Ústavný súd iba nedávno vystavil zásadnú stopku vládnemu zákonu o mimovládkach,. Po snahe onálepkovať Trestí sektor ako agentov cudzej moci, tak legislatívne zlyhal aj koaličný pokus spraviť z mimovládneho sektora výlučných lobistov. Napriek verdiktu ústavných sudcov však politická a administratívna vojna vládnej koalície voči tretiemu sektoru ani zďaleka nekončí. Napokon, svedčia o tom aj slová i činy premiéra Fica, ktorý sa svojim nepriateľským postojom k občianskej spoločnosti už dlhodobo nijako netají a svoju vládu už pri nástupe označil aj za koniec éry vlády mimovládok.Za pravdu mu mal dať aj vládny audit vybraných subjektov. Ten odhalil účtovné a finančné pochybenia vo viacerých renomovaných organizáciách, či už ide o Post Bellum alebo projekty spojené s disidentkou Martou Šimečkovou. Aké reálne výsledky teda tento audit v skutočnosti priniesol? Potvrdil vládnu propagandu cieliacu na občiansku spoločnosť a demaskoval zásadné finančné pochybenia Tretieho sektora alebo je to práve naopak?Preverovalo sa niečo cez 40 miliónov, nedostatky a pochybenia sa našli vo výške cez 230 tisíc, takže miera pochybenia je - i podľa samotného ministerstva financií, približne vo výške 0,5 percenta celkovej sumy. To je veľmi dobrý výsledok pre celý občiansky sektor a štátne inštitúcie by boli veľmi radi, keď by miera pochybenia pri ich vlastných projektoch bola iba pol percenta, tvrdí Juraj Rizman.Aktuálne - napriek auditu - však vláda nariadila ďalšie širokospektrálne kontroly mimovládnych organizácií a to aj v oblastiach ako je BOZP či GDPR. Dá sa teda už hovoriť o šikane občianskej spoločnosti a ustojí tretí sektor pokračujúcu šikanu vlády Roberta Fica? Vydržali sme Mečiara, vydržíme aj Fica. Zatiaľ všetci, ktorí sa snažili zakázať či obmedziť občiansku spoločnosť - či už to boli fašisti, komunisti alebo to bol V. Mečiar, tak vždy prehrali. Žiaľ, takto neustále plytváme potenciálom tých najaktívnejších ľudí tejto krajiny, hovorí Juraj Rizman. Vládna šikana podľa neho bude pokračovať a tretí sektor sa pokúsia rozdeliť metódou “cukru a biča”. Časť sektora si budú chcieť kúpiť a ostatných zastrašiť alebo aspoň odradiť, dodáva.Ráno Nahlas. Tentoraz s Jurajom Rizmanom z občianskeho združenia Post Bellum. Pekný deň a pokoj v duši praje Braňo Dobšinský
"It's not just about where your data lives - it's about who should, or shouldn't, have access to it."In this episode of Softcat's Explain IT podcast, host Helen Gidney, Head of Architecture at Softcat, is joined by Sabina Anja, Chief Technologist, VMware Cloud Foundation at Broadcom, and Gary Hawkins, Chief Technologist, Hybrid Platforms at Softcat, to demystify the complexities of Data Sovereignty.As organisations face increasing regulatory pressure and the rapid adoption of AI, understanding where your data lives - and who controls it - is critical. The discussion explores how governance, the Cloud Act, and GDPR are reshaping cloud strategies across Europe, driving a renewed interest in private cloud and sovereign cloud solutions.In this episode, Helen, Sabina and Gary discuss:• Defining Data Sovereignty: Why it is not just about location, but about jurisdiction, technical control, and operational access.• The Reality of Repatriation: Analysing the shift back to on-premise or Neo cloud environments to control data, without abandoning public cloud entirely.• Modern Infrastructure: How containers, Kubernetes, and AI demands are influencing infrastructure and data design.• The Power of Platforms: Meaningful insights on using VMware Cloud Foundation 9 (VCF9) to provide a unified control plane for policy-based data sovereignty.Thanks for listening to the Explain IT podcast from Softcat.This podcast is produced by The Podcast Coach. Hosted on Acast. See acast.com/privacy for more information.
Irish SMEs may be unknowingly breaching GDPR and failing to meet Workplace Relations Commission (WRC) record-keeping requirements due to widespread gaps in how HR documents are stored, accessed, and governed. That is, according to new findings published from the Irish SME HR Report, by Ireland's leading people management platform, HRLocker. The report, based on responses from professionals working on HR in organisations employing 20–249 people, reveals that document disorder has become one of the most significant, yet preventable, compliance risks facing Irish businesses. Two-thirds breach GDPR due to insecure HR data storage Under Articles 5 and 32 of the EU's General Data Protection Regulation (GDPR), employers must ensure the integrity, confidentiality, and security of employees' personal data. Yet 66 per cent of SMEs continue to store HR documents in insecure systems, including general cloud folders (32 per cent), local hard drives (11 per cent), paper files (11 per cent) and email threads (9 per cent). The Data Protection Commission has already investigated SMEs for similar failures. In a recently published case, an employer mishandled sensitive employment information during a data breach, prompting an official complaint and regulatory intervention. The DPC found that the organisation had not implemented adequate safeguards to protect employee data, providing a clear example of the real?world consequences of poor HR document governance. Under GDPR, failures of this kind can result in administrative fines of up to €10 million or 2 per cent of global turnover, as well as compensation claims from affected employees. More than half failing to comply with data protection regulations The report highlights that 59 per cent of SMEs lack accurate, formal version control, risking breaches of GDPR Article 5(1)(d), which requires organisations to maintain accurate and up?to?date employee records. Further, 56 per cent do not have a current retention policy for HR data, despite the GDPR storage limitation principle and obligations under the Data Protection Act 2018. Mid-sized SMEs (50–99 employees) are the least compliant, with over one-third (39 per cent) lacking any retention policy at all. Without version control or retention schedules, SMEs cannot demonstrate compliance during WRC inspections or GDPR investigations, leaving them exposed to enforcement action, compensation claims, and costly remediation work. More than one in three risks undermining accountability requirements There is a clear lack of auditability in the sector, with 26 per cent of SMEs reporting that they do not maintain an audit trail for HR document access and changes. A further 27 per cent are unsure whether one exists, meaning more than one in three lack robust processes. This lack and uncertainty place organisations at risk of breaching GDPR Articles 24 and 30, which require employers to demonstrate accountability and maintain clear records of processing activities. In the event of a data-access request, breach investigation, or WRC inspection, the absence of an audit trail can lead to immediate compliance failure. Non-compliance carries real financial and operational consequences Governance gaps fuelled by document disorder also undermine compliance with core Workplace Relations Commission (WRC) record-keeping obligations, including requirements to maintain accurate, accessible, and up-to-date records on: Working hours Annual leave and public holidays Contracts and terms of employment Payroll and remuneration Disciplinary and grievance procedures Under the Workplace Relations Act 2023, missing audit trails, outdated files, or scattered storage systems can result in fixed-payment notices of up to €2,000 per offence, in addition to compensation awards to employees and orders to rectify records at the employer's expense. These costs come on top of business disruption during follow-up inspections and reputational damage that undermines employee trust. A preven...
Vládny audit bol politickým zadaním no preukázal veľmi dobré výsledky občianského sektora. Reputačné škody ale budú obrovské, pre Aktuality to povedal Juraj Rizman z organizácie Post Bellum. Štát a jeho inštitúcie by boli veľmi radi, keby miera pochybenia pri ich vlastných projektoch bola iba pol percenta, dodáva. Ustojí Tretí sektor vládnu šikanu a prečo Juraj Rizman zažaloval Luboša Blahu?Ústavný súd iba nedávno vystavil zásadnú stopku vládnemu zákonu o mimovládkach,. Po snahe onálepkovať Trestí sektor ako agentov cudzej moci, tak legislatívne zlyhal aj koaličný pokus spraviť z mimovládneho sektora výlučných lobistov. Napriek verdiktu ústavných sudcov však politická a administratívna vojna vládnej koalície voči tretiemu sektoru ani zďaleka nekončí. Napokon, svedčia o tom aj slová i činy premiéra Fica, ktorý sa svojim nepriateľským postojom k občianskej spoločnosti už dlhodobo nijako netají a svoju vládu už pri nástupe označil aj za koniec éry vlády mimovládok.Za pravdu mu mal dať aj vládny audit vybraných subjektov. Ten odhalil účtovné a finančné pochybenia vo viacerých renomovaných organizáciách, či už ide o Post Bellum alebo projekty spojené s disidentkou Martou Šimečkovou. Aké reálne výsledky teda tento audit v skutočnosti priniesol? Potvrdil vládnu propagandu cieliacu na občiansku spoločnosť a demaskoval zásadné finančné pochybenia Tretieho sektora alebo je to práve naopak?Preverovalo sa niečo cez 40 miliónov, nedostatky a pochybenia sa našli vo výške cez 230 tisíc, takže miera pochybenia je - i podľa samotného ministerstva financií, približne vo výške 0,5 percenta celkovej sumy. To je veľmi dobrý výsledok pre celý občiansky sektor a štátne inštitúcie by boli veľmi radi, keď by miera pochybenia pri ich vlastných projektoch bola iba pol percenta, tvrdí Juraj Rizman.Aktuálne - napriek auditu - však vláda nariadila ďalšie širokospektrálne kontroly mimovládnych organizácií a to aj v oblastiach ako je BOZP či GDPR. Dá sa teda už hovoriť o šikane občianskej spoločnosti a ustojí tretí sektor pokračujúcu šikanu vlády Roberta Fica? Vydržali sme Mečiara, vydržíme aj Fica. Zatiaľ všetci, ktorí sa snažili zakázať či obmedziť občiansku spoločnosť - či už to boli fašisti, komunisti alebo to bol V. Mečiar, tak vždy prehrali. Žiaľ, takto neustále plytváme potenciálom tých najaktívnejších ľudí tejto krajiny, hovorí Juraj Rizman. Vládna šikana podľa neho bude pokračovať a tretí sektor sa pokúsia rozdeliť metódou “cukru a biča”. Časť sektora si budú chcieť kúpiť a ostatných zastrašiť alebo aspoň odradiť, dodáva.Ráno Nahlas. Tentoraz s Jurajom Rizmanom z občianskeho združenia Post Bellum. Pekný deň a pokoj v duši praje Braňo Dobšinský
Microsoft Project Silica börjar snart bli verklighet. Det bygger på att lagda data på glas och det ska kunna bevaras i flera tusen år. Så ... vad är egentligen utmaningen med långtidslagring? Hur ska man arbeta med det i praktiken? Hur hänger det ihop med informationsklassning? Vad säger GDPR och varför behöver till exempel systemdokumentationen om ett ekonomisystem bevaras så länge? Erik Zalitis och Mattias Jadesköld vänder och vrider på begreppen, de olika tekniska delarna och framförallt säkerheten gällande långtidslagring. Lyssna här: https://www.itsakerhetspodden.se/320-utmaningarna-med-langtidslagring/
ondevocali.it - Area riservata ai membri Question: elenca le argomentazioni trattate in forma di elenco puntato ---Identificazione dei minori online: Discussione sull'obbligo di identificare i minori che utilizzano servizi digitali, in particolare su piattaforme come Discord.GDPR e tutela dei minori: Applicazione del Regolamento Generale sulla Protezione dei Dati (GDPR) nei confronti dei minori, con focus sulla personalizzazione dei servizi.Critiche all'approccio attuale: Analisi delle criticità legate all'identificazione dei minori, tra cui la violazione della net neutrality e la raccolta di dati sensibili.Meccanismi di identificazione: Problemi legati ai metodi di identificazione, come l'uso di documenti d'identità e il riconoscimento biometrico.Piattaforme e responsabilità: Responsabilità delle piattaforme nella moderazione dei contenuti e nella gestione dei gruppi online.Proposte alternative: Soluzioni alternative per la tutela dei minori, come l'uso di pseudonimi e l'anonimato.Rischi legati all'identificazione: Possibili rischi derivanti dall'identificazione dei minori, tra cui attacchi mirati e violazioni della privacy.Esempi concreti: Analisi di casi specifici, come l'approccio di Discord e le normative australiane.Critiche alle autorità: Critiche alle autorità europee e ai legislatori per la mancanza di razionalità e fiducia nei confronti dei tecnici.Soluzioni proposte: Proposte di soluzioni alternative, come l'uso di strumenti offerti dal Garante per l'infanzia.Model: 202602230952|devstral-small-latest|3233|357|3590|0.000718 - (max 3687)
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1UNTITLED with Kendall and Cooterdoodle is BACK for another season! These two fantasy football experts are here to give you all of the information you need to know this NFL offseason for fantasy football, all while having a bit of fun along the way!In today's epsiode: Did you hear that the Seahawks aren't going to franchise tag Kenneth Walker? Kendall is giving up ADP for lent?! Breaking down recently dropped NFL win totals Who is going to get franchise tagged? Kendall and Cooterdoodle are here to break it all down! Learn more about your ad choices. Visit megaphone.fm/adchoices
Today we are talking about Mautic, marketing automation, and its history with Drupal with guest Ruth Cheesley. We'll also cover Mautic ECA as our module of the week. For show notes visit: https://www.talkingDrupal.com/541 Topics What Is Mautic? Self-Hosting and Data Ownership Who Uses Mautic + Personalization Mautic's History with Drupal How Drupal Integrate Mautic Orchestration in Mautic Privacy & Compliance: GDPR Tools, Consent, and Do-Not-Contact Controls Hosting Options Advanced Segmentation Points-Based Lead Scoring Validating Segments Using Points to Boost Common Mautic Adoption Pitfalls Getting Support The Future with AI AI and Open Source Maintenance Mautic Sustainability & Fundraising How to Contribute Resources Mautic Mautic Integration Advanced Mautic Integration Talking Drupal #343 - Marketing Automation with Mautic Managed hosting, 40% goes to the community Mautic/Drupal case study and presentation on that from our conference https://www.youtube.com/watch?v=r0SkfeHTLK8 https://mautic.org/case-study/inagro/ GDPR cleanup jobs to remove old data Anonymization tasks to comply with specific laws (eg CCPA) Anonymize IP setting Proposal to overhaul all things privacy and streamline experience for marketers - currently seeking funding, planning to ship in Mautic 9 Mautic contribution docs Testing PRs: inlcuding local setup guide Low/no-code tasks board Thanks Dev Ecosystems Guests Ruth Cheesley - ruthcheesley.co.uk RCheesley Hosts Nic Laflin - nLighteneddevelopment.com nicxvan John Picozzi - epam.com johnpicozzi Catherine Tsiboukas - mindcraftgroup.com bletch MOTW Correspondent Martin Anderson-Clutz - mandclu.com mandclu Brief description: Have you ever wanted to integrate Mautic marketing automation into your Drupal website, using ECA? There's a module for that. Module name/project name: Mautic ECA Brief history How old: created in Jun 2025 by Abhisek Mazumdar (abhisekmazumdar) of Dropsolid Versions available: 1.0.6 which works with Drupal 10 and 11 Maintainership Actively maintained Documentation - detailed README Number of open issues: 1 open issues, which is not a bug Usage stats: 3 sites Module features and usage With the module installed, your ECA models can respond to Mautic webhooks, and can also make use of new actions to give you CRUD capabilities (Create, Read, Update, or Delete) for contacts and segments within ECA Mautic ECA declares the Mautic API module as a dependency, and you need to use it to set up an API connection, and to define any webhooks you want to use in your models It's worth noting that the maintainers of Mautic ECA also seem to be involved with a number of other modules in the Mautic API ecosystem, including Mautic Personalization, as well as Mautic Content Provider, which can expose Drupal content for use in Mautic, for example to include in emails
In questa puntata parliamo con Antonio Baldassarra, CEO di Seeweb, per entrare nel cuore operativo di un cloud provider. Dalla progettazione di un datacenter alla gestione dell'hardware, emergono dinamiche economiche, scelte tecniche e responsabilità imprenditoriali che raramente vengono raccontate. L'episodio offre uno sguardo concreto su cosa significa costruire e far evolvere l'infrastruttura cloud oggi.La riflessione si estende poi al ruolo che l'Europa può svolgere nello sviluppo di un'offerta cloud credibile e competitiva. Una discussione pragmatica, utile a chi prende decisioni tecnologiche con impatti strategici.
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee. https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1 We're back with another episode of Fantasy Life with Ian Hartitz and in today's episode Ian is joined by fantasy football and award-winning NFL mock drafter Matthew Freedman to break down the 2026 NFL Draft Class and, more specifically, the quarterbacks in this class. In today's episode: WHY is Fernando Mendoza the consensus QB1 of this class? Who actually is the QB2 after Mendoza? Could a surprise QB from North Dakota State make waves? We're talking all this and so much more! Learn more about your ad choices. Visit megaphone.fm/adchoices
Where can we retain the human touch, impactfully, in the age of AI? Thomas Scherer, cloud architect & computer scientist working for Google joins Lisa. One Saturday night, Thomas sat down with Gemini and asked, "What will make me the happiest person in the world?" Over the course of the next few hours, he got some fascinating results. All of this is part of the story of AI in our lives today, but there is so much more. This conversation is a small reflection of where we are with AI and why we should embrace its benefits, learning as much as we can with careful curiosity. From Horses to Cars “What do I do with my horse-riding skills now that the car has been invented?” With this statement, Thomas reminds us that mega shifts in our human experience is historically normal, and a reflection of the human mind's brilliance. The AI Shift is just another technological step change. AI is replacing ‘commodity tasks' - those which are repetitive, standardised processes, providing us with more time to lean into creativity. We become the navigator whilst the more mundane jobs could be taken over by AI. A new way to Search Traditional search engines try to match words whereas modern AI systems match meaning. When you search for trousers for instance, AI systems can use images and semantic understanding to infer style, intent, and context rather than just scanning for the keyword ‘pants or trousers.' Large language models (LLMs) such as Gemini, ChatGPT, Claude, Perplexity, and so on, predict the most likely next word, turning colossal amounts of data into fluent conversation, explanation, and even advice based solely on statistical probability of word patterns. We don't even need to invent the perfect query as they can also predict this. AI as Your Collaborative Partner Used well, AI is more like a creative collaborator: a brainstorming partner that proposes alternative angles, structures, and prompts. For small businesses, it can become an extra “virtual team,” generating draft podcasts, social posts, or marketing visuals that can then be curated and refined. But all the while, it remains the human who sets the objectives and the required tone. This also lends itself to the possibility of many people becoming autonomous, single-person businesses. Agents: When AIs Start Working Together When you give an AI tools and sub-tasks, it can orchestrate them toward a goal. One agent might create images; another might check whether those images match the brief (e.g. 'sunny landscape, not rain'); together, they negotiate improvements until the output fits what you asked for. Even non-technical people can use early agent-like products. NotebookLM, for instance, lets you upload documents, then: - Ask questions about them in natural language. - Generate personalised podcasts from your own material that you can listen to during a commute. - Work across multiple languages, both in sources and in the audio you generate. A recurring complaint in companies is: “Our data is too messy to do AI.” That is partly true for training bespoke models: bad data in, bad model out, but paradoxically, AI is also very good at cleaning data in the first place. You can literally give such a tool a messy folder of information and ask to make sense of it. Because it understands patterns in addresses, email formats, names, and categories, AI can, for example: - Standardise your contact lists so mailings no longer bounce. - Extract fields from scanned paperwork and fill out forms for you. - Help you perform a “data spring clean” on everything from CRM records to home admin. For an individual drowning in paperwork, this is transformative: scan, upload, and ask the AI to pre-fill or summarise, then you simply review and sign. Everyday Simplifications with AI You do not need to be a computer scientist to get real value from AI. A good starting sequence for a normal day could include: - Identify what you hate doing: repetitive emails, calendar logistics, summarising long documents, or form-filling. - Ask the AI directly: “Show me how to use you to spend less time on this task,” then iterate based on its suggestions. - Start with non-sensitive data and low‑risk tasks, and only move to personal or client material once you understand the provider's terms and privacy guarantees. People in Luxembourg working across languages can also benefit from live translation and dubbing: tools already exist that let you speak in German and be heard in French or English in your own voice, with a slight delay, in meetings or recorded content. Jobs, Risk, and the Human Edge AI is reshaping the job market. In the UK, one study found that companies using AI had eliminated 11% of previous roles and left another 12% unfilled, while creating 19% new roles, which is a net loss of 4% overall, with the UK faring worse than the US on the balance between jobs lost and created. That reality naturally fuels both excitement and anxiety. What AI targets first are commodity tasks: copy-pasting, routine classification, basic template writing, or standardised analysis. The more your work relies on unique human context, judgment, empathy, and rapport, from live concerts to therapy and even parenting, the harder it is to replace. The opportunity, and pressure, is to climb the value chain: stop being the engine that moves the data and become the navigator who decides where to go. Trust, Safety, and Owning Your Self Image and Voice As AI systems get better at imitating voices and faces, distinguishing fake from real becomes a societal survival skill. Voice scams already exploit cloned speech to convince parents their child is in danger, and manipulated images can travel faster than fact‑checks. Two layers of protection are emerging: - Technical safeguards such as watermarking in generated images or audio, which allow downstream tools to flag AI‑created content. - Legal and ethical frameworks like GDPR in Europe, which treat your appearance and voice as personal data requiring your consent for alteration and reuse. - Providers also increasingly commit to indemnifying users when material generated within the rules is later challenged on copyright grounds, shifting some of the risk back to the platforms that trained the models. Prompting: Talking to AI so It Really Helps You do not need to be a prompt engineer, but a few habits make a big difference. First, describe what you do want rather than only what you do not want: “Keep the face unchanged and brighten the background” works better than “Don't change the face.” Second, you can use AI to improve your own prompts: - Tell it your goal (“I want a video that shows X for Y audience”). - Ask: “Write a detailed prompt I can paste into a video/image generator.” - Edit the suggested prompt so it fits your tone, context, and constraints. Over time, this becomes a self-teaching loop: the AI drafts the prompt, you tweak and observe the output, and your intuitive sense of what to ask for gets sharper. AI, Emotions, and the Limits of the Machine Some people now confide in chatbots as if they were friends or therapists. In one late-night experiment, Thomas asked Gemini to interview him and figure out what would make him “the happiest person in the world”; the system eventually pointed out contradictions in his answers and nudged him toward deeper reflection. That shows how AI can mirror back patterns in your own thinking and ask probing questions. But it still lacks the embodied empathy, nuanced perception, and ethical responsibility of a trained human therapist, who reads not just words but tone, pauses, posture, and history. AI can supplement support; it should not replace serious care. Why You Should Start Now Paradoxically, Thomas's biggest fear is not that AI will take over, but that people will be left behind because they are too afraid to try it. Like refusing to learn to drive when everyone else has moved to cars, opting out of AI entirely risks shrinking your options just as the toolset explodes. The most practical stance is curious, critical use: test it, set boundaries, keep the human touch at the centre, and let the machines handle the drudgery.
Send a textWhat actually needs to be in place before digital pathology can replace the microscope?In this episode of DigiPath Digest, I walk through the 2026 Polish Society of Pathologists guidelines and translate them into practical steps for real pathology labs. This isn't theory. It's about hardware fidelity, data integrity, validation, and AI integration — and what each of these actually requires in daily workflow.We talk about scanner resolution standards (≤0.26 μm per pixel), 4K monitor calibration, visually lossless compression (20:1), scalable storage, pathologist-driven validation, and what “non-inferiority” truly means.Digital pathology is not just a change of medium. It's an operational shift.Episode Highlights[00:02] Community & growth 1,600+ new newsletter subscribers, 10,000+ Facebook members, and free Digital Pathology 101 book access.[07:20] The 4 pillars of adoption Hardware fidelity · Data integrity · Clinical validation · Future integration.[08:30] Hardware requirements 40x equivalent scanning (≤0.26 μm/px), 4K monitors, >300 cd/m² luminance, 10-bit color depth.[12:00] Workflow & throughput 200–300 slides/day per scanner, automated focus control, urgent case prioritization.[17:25] Storage & archiving ~1 GB per slide. Active archive (6–24 months). Long-term retention (10–20 years). GDPR compliance & TLS encryption.[23:09] Validation philosophy Pathologist-centered validation. Two phases: • Familiarization (~20 retrospective cases) • Dual review with discrepancy tracking Goal: digital must be non-inferior to glass.[29:03] AI in digital pathology AI supports quantification (Ki-67, HER2, ER/PR, PD-L1), tumor detection, and future multimodal predictions — but pathologists remain central.[33:26] Intraoperative telepathology
I veckans odpod: Kinas RoboCop, sovjetisk schack, ett reglerat internet, falsk punk och så klämtar klockan för krypto. Om du kan, stöd oss på http://patreon.com/odpod
AI is transforming the world—but is it transforming privacy for better or for risk? We trust our GP with our deepest secrets, but can we extend that same trust to AI-powered systems and cloud-based suppliers? And if AI can re-identify people even in anonymized research data, is “anonymous” still real anymore? In this episode, Punit Bhatia and Tania Palmariellodiviney reveals how AI tools reshape confidentiality, integrity, availability, cloud sprawl, supplier risk, clinical transcription accuracy, re-identification, and even personal fears like voice-based deepfakes. The voice of experience rings clear: digital trust isn't a checkbox…it's engineered early with transparency, responsible data use, privacy by design, and safety by design.
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1We're back with another episode of Fantasy Life with Ian Hartitz and in today's episode Ian is joined by fantasy football expert Dwain "The Rock" McFarland to break down everything you need to know about the quarterback position this NFL offseason.What are the sure fire moves that teams will make this offseason? Will Minnesota get competition for J.J. McCarthy? Where will guys like Kyler Murray and Tua Tagovailoa end up in the trade market? We're breaking down all this and so much more of the NFL offseason and how the QB position may shape up! Learn more about your ad choices. Visit megaphone.fm/adchoices
Most B2B companies struggle to turn marketing into measurable pipeline. At B2B Better, we build owned media systems that sales teams actually use to close deals, shortening cycles, improving reply rates, and directly influencing revenue. If you're tired of content that looks good on paper but doesn't move the business forward, visit the links in the show notes to learn how we do it differently. If your best clients won't sign case studies because legal says no, this episode shows you exactly how to flip that dynamic. Host Jason Bradwell shares how he cracked this problem working in broadcast media tech, where sports properties refused to give free logo rights to vendors they were already paying. Jason's core point: legal teams don't fear telling the story, they fear losing control over how it's told. Traditional case studies feel like monumental approval chains with multiple drafts and stakeholder reviews. It's easier to just say no. Jason worked for a tech company serving major sports media properties. The opportunity seemed obvious: tell stories about household name clients. But sports rights holders get paid millions for sponsorship rights. Why would they give a tech vendor free permission to use their name for marketing? Most teams try tactics that don't work: anonymous case studies nobody believes, paying for logo rights, using old logos without permission, or giving up entirely and competing on price. Here's what changed. When Jason's team sat down with legal teams, they learned it wasn't fear of the story—it was fear of losing control and bandwidth nightmares. So they launched a podcast with a different value exchange. Instead of "come talk about how great we are," the pitch was "come talk about your work and how you see the industry evolving." Questions submitted in advance. Full approval. Nothing goes live without sign-off. A VP of digital from a major sports league who'd said no to every promotional request for years agreed almost immediately. When Jason asked why, the answer was clear: "For years you've been asking me to do things for you. But this time you asked me to do something for me." The unlock is simple. Traditional case studies ask for public endorsement with high risk and zero personal upside. Editorial podcasts offer a platform to showcase expertise, professionally produced content they can use, and full control. The acceptance rate jumps from 5% for case studies to 70% for editorial podcasts. Sales can share clips without requiring testimonials, and the credibility is more authentic because it doesn't feel like marketing. Chapter Markers 00:00 - The legal blocker problem across every sector 01:00 - Working with sports media properties that wouldn't give logo rights 02:00 - Why GDPR and compliance make traditional case studies nearly impossible 03:00 - Four failed attempts most teams try 04:00 - What legal and compliance teams actually fear 05:00 - How podcasts flip the value exchange 06:00 - The breakthrough moment with the VP of digital 07:00 - Why "look how great they are" beats "look how great we are" 08:00 - Traditional case study vs editorial podcast value exchange 09:00 - The counterintuitive power of implied association 10:00 - The seven-step execution process 11:00 - Using content strategically in sales without testimonials 12:00 - Acceptance rates and ROI timeline 13:00 - Why this works even for clients who'd sign case studies 14:00 - The challenge: Email your top 10 blocked clients Useful Links Connect with Jason Bradwell on LinkedIn Check out The Tim Ferriss Show and The Twenty Minute VC Explore B2B Better website and the Pipe Dream podcast
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1We're throwing it back to Super Bowl week on Fantasy Life on Sirius XM Fantasy Sports Radio with fantasy football experts Kendall Valenzuela and Adam Ronis as they discuss some way-too-early running back rankings for the 2026 season.But we're not stopping there, Kendall and Adam also are giving their way too early "My Guys" for the 2026 fantasy football season. Who are they high on in early ADPs over at Underdog fantasy and who do they expect to rise and fall by the time the season comes around? Learn more about your ad choices. Visit megaphone.fm/adchoices
At ITEXPO / MSP EXPO, Zack Schwartz, Vice President of Strategic Partnerships at Trustifi, joined Doug Green to discuss a critical but often overlooked reality: while AI dominates headlines, email remains the primary attack vector for cybercrime. Trustifi delivers a full-suite email security platform purpose-built for MSPs, enabling easy deployment, centralized management, and advanced protection against next-generation AI-driven phishing attacks. Schwartz emphasized that over 91% of cyberattacks still originate from inbound email—and the sophistication of those attacks has grown dramatically with AI tools. “Cyber criminals are leveraging AI to create extremely nuanced attacks,” he explained. Trustifi addresses this by combining high-efficacy inbound phishing detection with innovative AI-driven training tools. One standout feature allows MSPs to convert a real phishing attack into customized security awareness training, generating targeted video content based on an incident that actually occurred within a customer's environment. A key differentiator is Trustifi's “journal-only mode,” which allows MSPs to deploy the platform without interrupting live email flow. The system produces a full report showing how Trustifi would have responded to threats, creating what Schwartz described as a powerful “aha moment” for customers. According to Trustifi, this approach converts over 80% of opportunities and requires only minutes to set up—at no cost to the partner or end client. Beyond inbound threats, Trustifi also addresses outbound risk and compliance requirements, including HIPAA, PCI, GDPR, and broader data loss prevention (DLP) concerns. Many organizations underestimate how much sensitive information leaves their network via email. “It's a big issue of not knowing what you don't know,” Schwartz said, highlighting how classification and encryption tools expose hidden vulnerabilities. With no minimum requirements, free NFR licenses for MSPs, and strong momentum away from legacy email gateways, Trustifi is positioning itself as a high-margin opportunity within the channel. The message to MSPs: start internally, see the exposure firsthand, and then extend protection across your customer base. Visit https://trustifi.com/
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee. https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1 Welcome back to THE Fantasy Life Show with Ian Hartitz! In today's episode, Ian is joined by the one and only Matthew Freedman to talk through some of the players who could be potential cap casualties this offseason and become free agents in the NFL in 2026. From the guys who definitely aren't getting cut, to the ones that we (selfishly) may want to see cut for our own fantasy purposes, we're breaking down all of the running backs, wide receivers, tight ends and quarterbacks who could be on the chopping block from some teams in order to make some room on their teams' bottom lines. In today's episode: - Tyreek Hill is FOR SURE going to get cut... right? - Could New Orleans target a new STUD RB1 in the draft? - Could Kirk Cousins fight for a starting job back in Minnesota? We're talking all this and so much more! ______________________ If you want more of Fantasy Life, check us out at FantasyLife.com, where all our analysis is free, smart, fun, and has won a bunch of awards. We have an awesome free seven-day-a-week fantasy newsletter (which would win awards if they existed, we assure you!): https://www.fantasylife.com/fantasy-newsletter-5 And if you want to go deeper, check out our suite of also-award-winning premium tools at FantasyLife.com/pricing But really we hope you just are enjoying what you clicked on here, and come back for more. We are here to help you win!! 00:00 - Intro 02:16 - Potential RB Cap Casualties 15:21 - Potential WR Cap Casualties 29:48 - Potential TE Cap Casualties 42:15 - Potential QB Cap Casualties Learn more about your ad choices. Visit megaphone.fm/adchoices
What does AI really mean in simple terms? What are the biggest security and privacy risks for companies—especially in healthcare? How can organizations manage these risks effectively and stay compliant with fast-changing AI regulations? And why should businesses and professionals consider getting certified in ISO 42001, the new international standard for AI management systems? In this episode, Punit Bhatia talks with Walter Haydock, an expert in AI security and compliance, about how companies can use ISO 42001 to manage AI responsibly. They discuss the real-world risks of AI, practical steps to reduce them, and why certification can help build trust, credibility, and resilience in an AI-powered world.
Listen now on Apple, Spotify, and YouTube.—Berkay is a UX researcher with over eight years of experience, mostly in e-commerce and banking, working across both B2B and B2C. He has a bachelor's and a master's degree in product design and design research. His focus is on turning research into actionable insights, improving research processes and helping teams make user-centered decisions. Basically, reducing uncertainty. He also co-founded UXR Playground, Turkey's leading UX platform, where he runs trainings, workshops and mentorship programs. In a past role, he built and led a ResearchOps team, creating systems to make research more efficient and scalable.In our conversation, we discuss:* The eight-step framework Berkay uses for smooth, ethical participant recruitment, built from actual interviews and field work.* Why many researchers are flying blind with recruitment and how junior researchers often end up as accidental call center reps.* The most common screw-ups in screener surveys and how to write questions that don't sabotage your study before it starts.* How Berkay built a participant panel inside a 30-million-user company without a budget, and with legal breathing down his neck.* Why most panels fall apart after setup, and what to actually prioritize if you want yours to last longer than three studies.Some takeaways:* Ethics aren't optional. If you're collecting personal data, you're responsible for what happens to it. Berkay shares how one company got sued after leaking participant emails. It's not a footnote, it's a risk. Build ethics and legal compliance into your process from day one, or you'll learn the hard way.* Most companies are bad at recruitment and fixing it takes more than tools. Berkay got so fed up with watching junior researchers waste hours cold-calling participants that he turned the whole thing into a research study. The findings? A total lack of structure, zero shared frameworks, and a ton of internal guesswork pretending to be process.* Bad screener surveys kill good research. Asking “Do you use this app?” is a great way to recruit liars. Berkay shares simple but smart ways to avoid bias in screeners like using multi-select questions, hiding the research topic, and adding duplicate questions to sniff out lazy responses.* Building a panel sounds smart until you have to maintain it. Setting up a panel is the easy part. The real challenge is keeping the data clean, staying GDPR-compliant, and making participants feel like they're still part of something. Regular outreach (like quarterly surveys) and strong ties to your data team are non-negotiable.* A good panel is a cross-team operation. Berkay didn't just build a landing page and hope for the best. He brought in product, customer support, PMs, and data science from the start. If you want a panel that works across research needs and methods, it has to be owned across the company too.Where to find Berkay:* LinkedInStop piecing it together. Start leading the work.The Everything UXR Bundle is for researchers who are tired of duct-taping free templates and second-guessing what good looks like.You get my complete set of toolkits, templates, and strategy guides. used by teams across Google, Spotify, , to run credible research, influence decisions, and actually grow in your role.It's built to save you time, raise your game, and make you the person people turn to—not around.→ Save 140+ hours a year with ready-to-use templates and frameworks→ Boost productivity by 40% with tools that cut admin and sharpen your focus→ Increase research adoption by 50% through clearer, faster, more strategic deliveryInterested in sponsoring the podcast?Interested in sponsoring or advertising on this podcast? I'm always looking to partner with brands and businesses that align with my audience. Book a call or email me at nikki@userresearchacademy.com to learn more about sponsorship opportunities!The views and opinions expressed by the guests on this podcast are their own and do not necessarily reflect the views, positions, or policies of the host, the podcast, or any affiliated organizations or sponsors. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.userresearchstrategist.com/subscribe
Guest post by Crystel Robbins Rynne, CEO, HRLocker Irish SMEs are no strangers to pressure. They are the backbone of the economy, the employers of local communities, and the innovators driving Ireland's next wave of growth. Yet beneath that resilience lies a quieter, more pervasive anxiety. It surfaced clearly in HRLocker's recent research. As revealed in our Irish SME HR Report 2025, three-quarters (74%) of Irish SMEs fear they would fail a surprise Workplace Relations Commission (WRC) inspection. That figure is not about negligence. It is about confidence. Or more accurately, the lack of it. And it signals that the compliance burden on SMEs has reached a tipping point. The Confidence Gap: Why Good Businesses Still Feel Exposed Most SMEs want to do the right thing. They want fair contracts, accurate time records, transparent policies, and safe workplaces. But intent alone does not create compliance readiness. The reality is that many SMEs are operating with: Outdated or inconsistent employment contracts Patchy training records Manual time tracking that does not reflect modern hybrid work Policies stored across inboxes, desktops, and filing cabinets HR processes that rely on one overstretched person remembering everything This is not a failure of leadership. It is a failure of bandwidth. When regulations evolve quickly, inspections become more rigorous, and hybrid work adds new layers of complexity, SMEs often lack the internal infrastructure to keep pace. The result is a growing sense of audit anxiety. A fear that something important has slipped through the cracks. The Emotional Toll of Compliance Uncertainty Compliance is not just a legal obligation. It is an emotional one. For founders and HR leads, low confidence shows up as worry about reputational damage, fear of fines or enforcement actions, stress around documentation gaps, and sleepless nights before audits. When compliance becomes a source of dread, it drains energy from the work that actually grows a business. Innovation, culture, and customer experience all take a hit. Why Technology Is the Turning Point The good news is that the confidence gap is not inevitable. It is structural, and structural problems can be solved. HR technology is transforming compliance from a reactive scramble into a proactive and predictable process. The shift is significant. 1. Audit readiness becomes automatic. Modern HR platforms centralise contracts, policies, training records, and time data in one secure system. Version control, digital signatures, and automated updates give SMEs clarity about where they stand. 2. Gaps surface before they become liabilities. Dashboards highlight missing documents, expired certifications, or overdue reviews. Issues can be addressed long before an inspection. 3. Hybrid work becomes compliant by design. Accurate time tracking, remote attendance logs, and digital leave management remove the guesswork from flexible work arrangements. 4. Documentation becomes a strength, not a stressor. With everything stored, searchable, and timestamped, SMEs can demonstrate compliance with confidence rather than hope. 5. Leaders reclaim headspace. When the administrative burden lifts, founders and HR teams can focus on people, culture, and strategy. The Irish Context: Why Local Matters Ireland's regulatory landscape is unique. WRC inspections, GDPR obligations, and the rapid shift to hybrid work have created a compliance environment that is both demanding and fast-moving. The pace of change has been extraordinary. In the past three years, Irish employers have navigated statutory sick leave, auto-enrolment pensions, the right to request remote and flexible working, gender pay gap reporting, and domestic violence leave, with pay transparency requirements now on the horizon. Parental leave entitlements have also expanded. Each change, even when welcome, adds another layer of documentation, policy updates, and process adjustments. For SMEs that are already stretched thin, k...
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
None of Your Goddamn BusinessJohn Morgan Salomon said something during our conversation that I haven't stopped thinking about. We were discussing encryption, privacy laws, the usual terrain — and he cut through all of it with five words: "It's none of your goddamn business."Not elegant. Not diplomatic. But exactly right.John has spent 30 years in information security. He's Swiss, lives in Spain, advises governments and startups, and uses his real name on social media despite spending his career thinking about privacy. When someone like that tells you he's worried, you should probably pay attention.The immediate concern is something called "Chat Control" — a proposed EU law that would mandate access to encrypted communications on your phone. It's failed twice. It's now in its third iteration. The Danish Information Commissioner is pushing it. Germany and Poland are resisting. The European Parliament is next.The justification is familiar: child abuse materials, terrorism, drug trafficking. These are the straw man arguments that appear every time someone wants to break encryption. And John walked me through the pattern: tragedy strikes, laws pass in the emotional fervor, and those laws never go away. The Patriot Act. RIPA in the UK. The Clipper Chip the FBI tried to push in the 1990s. Same playbook, different decade.Here's the rhetorical trap: "Do you support terrorism? Do you support child abuse?" There's only one acceptable answer. And once you give it, you've already conceded the frame. You're now arguing about implementation rather than principle.But the principle matters. John calls it the panopticon — the Victorian-era prison design where all cells face inward toward a central guard tower. No walls. Total visibility. The transparent citizen. If you can see what everyone is doing, you can spot evil early. That's the theory.The reality is different. Once you build the infrastructure to monitor everyone, the question becomes: who decides what "evil" looks like? Child pornographers, sure. Terrorists, obviously. But what about LGBTQ individuals in countries where their existence is criminalized? John told me about visiting Chile in 2006, where his gay neighbor could only hold his partner's hand inside a hidden bar. That was a democracy. It was also a place where being yourself was punishable by prison.The targets expand. They always do. Catholics in 1960s America. Migrants today. Anyone who thinks differently from whoever holds power at any given moment. These laws don't just catch criminals — they set precedents. And precedents outlive the people who set them.John made another point that landed hard: the privacy we've already lost probably isn't coming back. Supermarket loyalty cards. Surveillance cameras. Social media profiles. Cookie consent dialogs we click through without reading. That version of privacy is dead. But there's another kind — the kind that prevents all that ambient data from being weaponized against you as an individual. The kind that stops your encrypted messages from becoming evidence of thought crimes. That privacy still exists. For now.Technology won't save us. John was clear about that. Neither will it destroy us. Technology is just an element in a much larger equation that includes human nature, greed, apathy, and the willingness of citizens to actually engage. He sent emails to 40 Spanish members of European Parliament about Chat Control. One responded.That's the real problem. Not the law. Not the technology. The apathy.Republic comes from "res publica" — the thing of the people. Benjamin Franklin supposedly said it best: "A republic, if you can keep it." Keeping it requires attention. Requires understanding what's at stake. Requires saying, when necessary: this is none of your goddamn business.Stay curious. Stay Human. Subscribe to the podcast. And if you have thoughts, drop them in the comments — I actually read them.Marco CiappelliSubscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.> https://www.linkedin.com/newsletters/7079849705156870144/Marco Ciappelli: https://www.marcociappelli.com/John Salomon Experienced, international information security leader. vCISO, board & startup advisor, strategist.https://www.linkedin.com/in/johnsalomon/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee. https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1 Welcome back to THE Fantasy Life Show with Ian Hartitz! In today's episode, Ian is joined by the one and only Dwain "The Rock" McFarland to break down Super Bowl LX and where we can see both of these teams going in 2026 (and the ramifications of that for fantasy football)! From Kenneth Walkers (literal) MVP performance to Drake Maye's struggles continuing into the Super Bowl, Ian and Dwain are breaking down all sides of the game so that you can know exactly the takeaways needed for fantasy football in 2026 from both the Seahawks and Patriots! AND THEN! Ian and Dwain break down some of the top landing spots for Quarterbacks and running backs entering 2026 NFL free agency and what that could mean for fantasy football! - Could Minnesota be the preferred landing spot for free agent quarterbacks? - Is Kansas City by-far-and-away the best landing spot for free agent RBs? - What if the Bears moved on from D'Andre Swift?
In this episode of Resilient Cyber, I sit down with VP, Product Marketing and Strategy for Protegrity, James Rice. We will be discussing how traditional approaches to security aren't solving the AI security challenge, the importance of data-centric approaches for secure AI implementation and addressing issues such as AI data leakage.James and I dove into a lot of great topics, including:Why traditional perimeter-based and infrastructure-centric security models are failing in the era of AI, and why organizations need to fundamentally rethink their approach to securing AI workloads.The concept of data-centric security — protecting the data itself rather than the systems surrounding it — and why this shift is critical as data flows across cloud platforms, AI models, and agentic workflows.The growing risk of AI data leakage and how sensitive information (PII, PHI, PCI, intellectual property) can inadvertently be exposed through AI training data, model outputs, prompt injection, and RAG pipelines.Why many organizations find themselves stuck in an "AI circularity" — wanting to leverage AI but unable to do so because of the complexity of securing critical business data throughout the AI lifecycle.The importance of embedding security controls inline within the AI pipeline — from data ingestion and model training to orchestration and output — rather than bolting security on after the fact.How data protection techniques such as tokenization, anonymization, dynamic masking, and format-preserving encryption can enable organizations to use realistic, context-rich data for AI while maintaining compliance and reducing risk.The challenge of securing agentic AI workflows, where autonomous agents continuously interact with enterprise data, making traditional access control models insufficient.How organizations can balance the need for AI innovation and data utility with regulatory compliance requirements across frameworks like GDPR, HIPAA, PCI DSS, and emerging AI-specific regulations.James's perspective on how security, risk, and compliance functions need to evolve to keep pace with the rapid productionization of AI across the enterprise.The role of semantic guardrails in governing AI inputs and outputs, ensuring that protection is applied contextually based on how data is being used — not just where it resides.About the GuestJames Rice is VP of Product Marketing and Strategy at Protegrity, a global leader in data-centric security. He brings over 20 years of experience in security, risk, and compliance, having provided solution engineering, value engineering, and implementation services to Fortune 1000 organizations across industries. Prior to Protegrity, James held leadership roles at Pathlock (formerly Greenlight Technologies), Accenture, and PricewaterhouseCoopers.About ProtegrityProtegrity is a data-centric security platform that protects sensitive data across hybrid, multi-cloud, and AI environments. Their approach embeds security directly into the data itself — enabling enterprises to unlock insights, accelerate innovation, and meet global compliance with confidence. Protegrity's solutions include data discovery and classification, tokenization, anonymization, dynamic masking, and semantic guardrails for AI and analytics workflows.Learn more at protegrity.com
Dr. Gabriela Zanfir-Fortuna is a globally recognized data protection law expert, with 15 years of experience in the field split between Europe and the U.S., spanning academia, public service, consulting and policy. She currently is Vice President for Global Privacy at the Future of Privacy Forum, a global non-profit headquartered in Washington DC, coordinating FPF's offices and partners in Brussels, Tel Aviv, Singapore, Nairobi, and New Delhi, and leading the work on global privacy and data protection developments related to new technologies, including AI. She is also a founding Advisory Board Member of Women in AI Governance, and an affiliated researcher to the LSTS Center of Vrije Universiteit Brussel.Dr. Zanfir-Fortuna worked for the European Data Protection Supervisor and is a member of the Reference Panel of the Global Privacy Assembly – the international organization reuniting data protection authorities around the world, as well as a member of the T20 engagement group of the G20 under Brazil's Presidency in 2024.She was elected to be part of the Executive Committee of ACM's Fairness, Accountability and Transparency (FaccT) Conference (2021-2022). Her scholarship on the GDPR is referenced by the Court of Justice of the EU, and in 2023 she won the Stefano Rodota Award of the Council of Europe for the paper “The Thin Red Line: Refocusing Data Protection Law on Automated-Decision-Making“, alongside her co-authors. Dr. Zanfir-Fortuna holds a PhD in Law with a thesis on the rights of the data subject under EU Data Protection Law, and an LLM in Human Rights (University of Craiova).With our guest, here for a third time, we have gone through the logic of the Digital Omnibus package aiming to reform a cluster of important EU regulations, the “birth defects” of the AI Act, the importance of South Korea in the global data protection panorama, and the potential consequences of the recent CJEU case, Russmedia.References:* Gabriela Zanfir-Fortuna at the Future of Privacy Forum* Gabriela Zanfir-Fortuna on LinkedIn* Gabriela Zanfir-Fortuna: A world tour of data protection laws (Masters of Privacy, April 2021)* Data Protection vs. Privacy and Data Privacy: a January 28th conundrum (with Gabriela Zanfir-Fortuna, Masters of Privacy - 2025)* X v Russmedia Digital SRL (CJEU, December 2, 2025). This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.mastersofprivacy.com/subscribe
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1Welcome to another episode of Fantasy Life with Ian Hartitz. In today's show, Ian is joined by fantasy football expert Dwain McFarland to break down Super Bowl LX. From every matchup that matters to their favorite bets, this is one you don't want to miss before you watch the big game.In today's episode:- How to host a successful Super Bowl experience!- Which matchups will be the deciding factors?- What utilization can you count on?- What are Ian and Dwain's predictions and favorite bets?We're talking all this and so much more!______________________If you want more of Fantasy Life, check us out at FantasyLife.com, where all our analysis is free, smart, fun, and has won a bunch of awards.We have an awesome free seven-day-a-week fantasy newsletter (which would win awards if they existed, we assure you!): https://www.fantasylife.com/fantasy-newsletter-5And if you want to go deeper, check out our suite of also-award-winning premium tools at FantasyLife.com/pricingBut really we hope you just are enjoying what you clicked on here, and come back for more. We are here to help you win!! Learn more about your ad choices. Visit megaphone.fm/adchoices
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee. https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1 Welcome to another episode of Fantasy Life with Ian Hartitz. In today's show, Ian is joined by fantasy football expert Matthew Freedman to break down coaching changes across the NFL in 2026. Looking at every Head Coaching and Offensive Coordinator hire so far, they'll examine the impact of each new offensive scheme for fantasy football. In today's episode: - Which running backs will benefit most from their new scheme? - What do the changes mean for the league's top tight ends? - Which players can you still draft with confidence? We're breaking down all this and so much more! ______________________ If you want more of Fantasy Life, check us out at FantasyLife.com, where all our analysis is free, smart, fun, and has won a bunch of awards. We have an awesome free seven-day-a-week fantasy newsletter (which would win awards if they existed, we assure you!): https://www.fantasylife.com/fantasy-newsletter-5 And if you want to go deeper, check out our suite of also-award-winning premium tools at FantasyLife.com/pricing But really we hope you just are enjoying what you clicked on here, and come back for more. We are here to help you win!! Learn more about your ad choices. Visit megaphone.fm/adchoices
What does AI really mean in simple terms? What are the biggest security and privacy risks for companies—especially in healthcare? How can organizations manage these risks effectively and stay compliant with fast-changing AI regulations? And why should businesses and professionals consider getting certified in ISO 42001, the new international standard for AI management systems?In this episode, Punit Bhatia talks with Walter Haydock, an expert in AI security and compliance, about how companies can use ISO 42001 to manage AI responsibly. They discuss the real-world risks of AI, practical steps to reduce them, and why certification can help build trust, credibility, and resilience in an AI-powered world.
AI has officially moved from experimentation to execution—and regulation is racing to catch up.In this episode of Reimagining Cyber, Tyler Moffitt is joined by Matt Aldridge to unpack what the rapidly evolving AI regulatory landscape means for security teams, businesses, and managed service providers heading into 2026.From the EU AI Act and GDPR to California's CPRA and emerging rules around automated decision-making, they explore how governments are trying to balance innovation with safety, privacy, and accountability. The conversation dives into the real-world security implications of agentic AI, autonomous decision-making, biased training data, and the growing risks of AI systems operating with minimal oversight.Whether you're an enterprise security leader, an SMB, or an MSP supporting multiple customers, this episode breaks down why AI regulation is no longer a future concern—and what practical steps organizations should be taking now to reduce risk, protect data, and responsibly govern AI adoption.As featured on Million Podcasts' Best 100 Cybersecurity Podcasts Top 50 Chief Information Security Officer CISO Podcasts Top 70 Security Hacking Podcasts This list is the most comprehensive ranking of Cyber Security Podcasts online and we are honoured to feature amongst the best! Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1Welcome to another episode of Fantasy Life with Ian Hartitz. In today's show, Ian is joined by fantasy football expert Dwain McFarland to break down the way-too-early ADP for the 2026 fantasy football season and share the “My Guys” they are targeting!In today's episode:- Which players are being drafted far too late?- Whose ADP is likely to rise or fall in the next few months?- What players should return value at their current early ADP?- Where should you draft the players in the upcoming rookie class of 2026?We're talking all this and so much more!______________________If you want more of Fantasy Life, check us out at FantasyLife.com, where all our analysis is free, smart, fun, and has won a bunch of awards.We have an awesome free seven-day-a-week fantasy newsletter (which would win awards if they existed, we assure you!): https://www.fantasylife.com/fantasy-newsletter-5And if you want to go deeper, check out our suite of also-award-winning premium tools at FantasyLife.com/pricingBut really we hope you just are enjoying what you clicked on here, and come back for more. We are here to help you win!! Learn more about your ad choices. Visit megaphone.fm/adchoices
Show Notes Tarek Matar, founder of Scalar AI, explains the tool's purpose. He describes Scalar AI as an AI engine designed for consultants to build McKinsey level, end-to-end slides and presentations. The tool is differentiated from general AI tools like ChatGPT and GPT-3 by focusing on consulting-grade presentations. The founders include a research scientist from Google Brain and two other experienced professionals. Features and Functionality of Scalar AI Scalar AI automates the entire research, analysis, structure, and visualization process for consultants. The tool can create single slides or entire decks based on user prompts.It offers various modes: AI generation, text to slide, and sketch to slide, allowing flexibility in input methods. The tool includes a custom brand identity feature, allowing users to upload and customize their firm's PowerPoint templates. A Scalar.AI Demonstration Tarek demonstrates the tool by creating a slide and a deck. Adding Prompts Adding custom brand identity Tarek creates a waterfall slide showing the top five countries by international tourist arrivals. Detailed data and insights The tool generates a visually appealing slide with detailed data and insights. Tarek explains the process of editing and refining the generated slides to meet specific needs. The Text to Slide Mode Tarek demonstrates the text to slide mode by pasting a long text about key success factors for post-merger integration in banking. Data generation The tool summarizes the text into a concise slide with bullet points and icons. They also show the sketch to slide mode by uploading a hand-drawn image, which the tool converts into a PowerPoint slide. The tool supports various image formats, including JPEG, PNG, and PDF. The Custom Brand Identity Feature Tarek explains the custom brand identity feature, which allows users to upload their firm's PowerPoint templates. The tool can save and apply custom colors, fonts, and slide masters. A prompting guide and video tutorials are available to help users effectively use the tool. Tarek mentions the importance of proper prompting to get the best results from the AI. Pricing and Subscription Details Tarek talks about the pricing and mentions discounts available for annual subscriptions and partnerships. The tool is designed for B2B clients, including consulting firms and independent consultants. Tarek discusses the possibility of working with freelancers and organizations like Umbrex to offer special pricing. The tool is integrated with PowerPoint, making it easy for users to access and use. Security and Data Privacy Tarek addresses concerns about data security and privacy when using Scalar AI. The tool uses enterprise LLMs and follows strict data retention policies, ensuring data is encrypted and anonymized. The tool generates slides on the user's device, not on Scalar AI's servers, maintaining data privacy. Tarek mentions that the tool is compliant with GDPR and can meet the security requirements of government entities. The Genesis Story of Scalar.AI Tarek shares the background of Scalar AI, including his experience as a consultant and his co-founders' technical expertise. The idea for the tool came from the need to automate workflows and create professional slides for consulting clients. The founders spent a significant amount of time in stealth mode, refining and testing the product. The tool is now entering the commercialization stage, with plans to expand its user base and features. Scalar.AI and the Consulting Industry Tarek discusses the potential impact of Scalar AI on the consulting industry. Tarek emphasizes the tool's ability to save time and improve productivity for consultants. They plan to continue refining the tool and exploring partnerships with organizations like Umbrex. Timestamps: 02:21: Features and Functionality of Scalar AI 02:37: Demonstration of Scalar AI's Capabilities 04:11: Text to Slide and Sketch to Slide Modes 22:15: Custom Brand Identity and Prompting Guide 22:36: Pricing and Subscription Details 31:08: Security and Data Privacy 36:14: Backstory and Development of Scalar AI Links: Website: getscalar.ai This episode on Umbrex: https://umbrex.com/wp-admin/post-new.php?post_type=unleashed#:~:text=https%3A//umbrex.com/unleashed/240677/ Unleashed is produced by Umbrex, which has a mission of connecting independent management consultants with one another, creating opportunities for members to meet, build relationships, and share lessons learned. Learn more at www.umbrex.com. *AI generated timestamps and show notes.
This Day in Legal History: Treaty of Guadalupe HidalgoOn February 2, 1848, the Treaty of Guadalupe Hidalgo was signed, officially ending the Mexican-American War and significantly altering the legal and territorial landscape of the United States. The treaty ceded vast swaths of land to the U.S., including present-day California, Arizona, New Mexico, and parts of several other western states—about half of Mexico's territory at the time. In exchange, the U.S. paid Mexico $15 million and assumed $3.25 million in claims by American citizens against Mexico. Legally, the treaty promised to protect the property rights and civil liberties of Mexican nationals living in the newly acquired territories, but these promises were inconsistently honored in practice.The treaty's ratification triggered significant legal and constitutional debates about the extension of slavery into new territories, setting the stage for the intensifying sectional conflicts that led to the Civil War. It also marked the beginning of long-standing disputes over land grants and water rights that would shape western property law. Moreover, the treaty's vague wording left many issues—such as tribal sovereignty and citizenship—unresolved, leading to future litigation and policy struggles.The treaty was signed in the town of Guadalupe Hidalgo, near Mexico City, and ratified by the U.S. Senate in March 1848. It remains a foundational document in U.S. legal history, frequently cited in discussions of land rights, citizenship, and the limits of treaty enforcement.Our first story today is a bit off topic.In today's digital world, every click, swipe, and login happens under a legal regime you didn't negotiate—Terms of Service, Privacy Policies, and community guidelines that quietly shape your rights and obligations online. These documents form a system of private lawmaking, where companies act as legislators, drafting rules users must follow, often with little recourse or transparency. You don't sign them, but courts often treat them as binding contracts. Clauses about arbitration, content ownership, surveillance, and data sharing carry real legal weight. Yet these terms can change overnight, unilaterally, and without notice.TOSTracker was created to bring transparency to this ecosystem. It's a non-commercial research tool that tracks and archives the evolution of digital contracts over time. With over 150 companies and nearly 250 historical versions of key documents thus far, TOSTracker offers timestamped, hash-verified, and citable records of how these texts change. It provides full version histories, detects redlines at the word and section level, and supports programmatic access through an API. Whether you're studying arbitration creep, GDPR compliance, or how moderation rules evolve, TOSTracker gives you the empirical backbone to do it.All content is normalized and archived via the Internet Archive's Wayback Machine, with cryptographic hashes ensuring document integrity. Importantly, it doesn't interpret the law—it captures the text and structure so you can. For legal researchers, privacy advocates, and anyone concerned with digital governance, this is a window into how private law is made, revised, and enforced online. It's not a product; it's a dataset, an archive, and a call to look more closely at the legal architecture of everyday tech.We're also actively seeking contributors to help expand the archive. If you come across a consumer-facing legal document—like a Terms of Service, Privacy Policy, community guidelines, or EULA—that isn't already tracked, you can submit it directly through the site. This includes documents behind logins, from smaller platforms, or covering underrepresented industries and regions. Submissions help close coverage gaps, diversify the dataset, and improve the foundation for legal research into how digital rights are defined and redefined over time. Your input directly supports transparency in an area where the law is often invisible.Check it out at tostracker.app if your research overlaps with digital contracts, user rights, or the evolving boundary between public law and platform governance.The U.S. Federal Trade Commission (FTC) has sent warning letters to 42 major law firms over concerns that their diversity, equity, and inclusion (DEI) hiring practices may be anticompetitive. The FTC emphasized that firm-wide agreements to meet diversity benchmarks—particularly those tied to programs like Diversity Lab's certification—could unlawfully restrict competition in the legal labor market by influencing hiring, compensation, or promotions. These letters arrive amid a broader rollback of DEI initiatives under President Donald Trump's administration, which has eliminated related programs in government and targeted private sector efforts.Firms such as Paul Weiss, WilmerHale, Perkins Coie, Skadden Arps, and Latham & Watkins—some of which had previously been challenged by Trump-era executive orders—are among those named. Some reached compromises with the White House, offering pro bono legal work in exchange for eased scrutiny, while others fought and won legal challenges against the orders. The FTC's scrutiny centers on participation in Diversity Lab's voluntary DEI certification, which encourages firms to ensure at least 30% of leadership candidates are from underrepresented groups. Though previously upheld in court as non-discriminatory, the FTC now frames such collective DEI practices as potentially violating competition law.US Federal Trade Commission warns law firms about DEI hiring | ReutersImmigrant rights groups filed a federal lawsuit in Boston challenging a new U.S. Immigration and Customs Enforcement (ICE) policy that allows agents to enter homes without judicial warrants. The suit, brought by the Greater Boston Latino Network and the Brazilian Worker Center, targets a May 2025 memo—recently revealed via a whistleblower complaint—that permits ICE officers to use administrative warrants instead of warrants signed by a federal judge. These administrative forms, issued internally by the Department of Homeland Security, were previously insufficient for home entries under longstanding practice.The plaintiffs argue that using such warrants for home arrests violates the Fourth Amendment, which guards against unreasonable searches and seizures. Legal advocates claim the policy removes a crucial constitutional safeguard just as ICE ramps up enforcement tactics in states like Minnesota, where multiple recent actions have already been deemed unlawful by judges. The lawsuit comes after fatal incidents in Minneapolis during anti-ICE protests, intensifying scrutiny of federal immigration operations.ICE officials defend the policy, asserting that individuals subject to removal have already received due process. However, the lawsuit challenges that rationale, pointing out that due process does not override constitutional protections against warrantless home intrusions.Lawsuit challenges ICE ability to enter homes without warrants from US judges | ReutersFormer CNN anchor Don Lemon is facing federal charges over his role in covering a protest at a Minnesota church opposing President Trump's immigration crackdown. The protest, which disrupted a church service in St. Paul on January 18, was livestreamed by Lemon and targeted the church because one pastor was allegedly also an ICE official. Lemon was arrested by the FBI, spent a night in custody, and appeared in court where he confirmed he plans to plead not guilty. He and six others, including independent journalist Georgia Fort, were indicted under laws prohibiting obstruction of access to houses of worship—a legal framework typically used against abortion clinic protests.Free press advocates and constitutional lawyers are raising concerns about the charges, framing them as part of a broader pattern of the Trump administration targeting critics, including journalists. Lemon's attorneys argue this is a political prosecution meant to suppress press freedom and distract from ongoing crises. In the archived livestream, Lemon is seen documenting the protest rather than leading it, further fueling First Amendment concerns. The DOJ's case hinges on a controversial interpretation of laws rarely, if ever, used to prosecute journalists for protest coverage after the fact. Legal experts say there is no clear precedent for the charges, and press freedom groups are warning of escalating threats to constitutional protections.Ex-CNN journalist Don Lemon faces Minnesota protest charges | Reuters This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.minimumcomp.com/subscribe
Send us a textResponsibility breaks where AI moves fastest, and that's exactly where we go today. Grant sits down with Daniel Ikem—strategic operator at the intersection of emerging technology, intellectual property, and public policy—to unpack how shadow AI, data limits, and legal gray zones collide inside modern organizations. From boardrooms pushing Copilot to teams quietly pasting prompts into other models, we trace how governance cracks form and why documentation, auditability, and accountability must evolve as quickly as the tools.Daniel shares firsthand insights from big-tech partnerships and from founding the Diverse IP Alliance, where he's helping HBCU and underrepresented students build fluency in AI and IP. We examine the core challenges leaders face: capturing tacit knowledge that models can't see, preventing biased historical data from influencing outcomes, and defining ownership of outputs when proprietary data mixes with external systems. We also tackle the jagged frontier of agentic AI—who's liable when autonomy kicks in—and the geopolitical reality that makes “slow down” easier to say than to implement.You'll walk away with pragmatic steps to act now: set clear policies on approved models and data access, capture critical processes that were never written down, design human-in-the-loop review for high-impact decisions, and build a living risk register that survives model updates. We compare U.S. uncertainty with GDPR and the EU AI Act to show where global benchmarks can guide you before domestic rules arrive. Above all, we make the case that governance is not just compliance—it's strategy, trust, and long-term resilience.If you care about AI governance, IP risk, bias, and building a talent pipeline that reflects the communities your systems will serve, this one's for you. Subscribe, share with a colleague who's wrestling with AI policy, and leave a review with your top governance question so we can tackle it next.Thanks for tuning in to this episode of Follow The Brand! We hope you enjoyed learning about the latest trends and strategies in Personal Branding, Business and Career Development, Financial Empowerment, Technology Innovation, and Executive Presence. To keep up with the latest insights and updates, visit 5starbdm.com. And don't miss Grant McGaugh's new book, First Light — a powerful guide to igniting your purpose and building a BRAVE brand that stands out in a changing world. - https://5starbdm.com/brave-masterclass/ See you next time on Follow The Brand!
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee. https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1 Welcome to another episode of Fantasy Life with Ian Hartitz. In today's show, Ian is joined by fantasy football expert Dwain McFarland where they break down some of the best things that happen in 2025 fantasy football and who the candidates are to repeat those things in 2026! In today's episode: - Who will be next year's Drake Maye? - Who will have late-season rookie breakouts? - What older players will be reliable again throughout 2026? We're talking all this and so much more! ______________________ If you want more of Fantasy Life, check us out at FantasyLife.com, where all our analysis is free, smart, fun, and has won a bunch of awards. We have an awesome free seven-day-a-week fantasy newsletter (which would win awards if they existed, we assure you!): https://www.fantasylife.com/fantasy-newsletter-5 And if you want to go deeper, check out our suite of also-award-winning premium tools at FantasyLife.com/pricing But really we hope you just are enjoying what you clicked on here, and come back for more. We are here to help you win!! 00:00 - Intro 02:40 - Late-Round Dual-Threat QBs 11:57 - What offensive gurus will elevate their teams? 23:34 - Surprising 3-down RB Workloads 33:23 - What older players will show out? 41:44 - Late-Season Rookie Booms Learn more about your ad choices. Visit megaphone.fm/adchoices
Check out Freedman's latest mock draft here: https://www.fantasylife.com/articles/nfl-draft/2026-nfl-mock-draft-carnell-tate-leads-five-wrs-in-the-first-round Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee. https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1 In today's episode of Fantasy Life with Ian Hartitz, we're breaking down the 2026 NFL Draft with Matthew Freedman! We're breaking down his latest 2026 NFL mock draft and some of the biggest questions surrounding it, especially for fantasy football! In today's episode: Could anyone trade up for Fernando Mendoza? The Saints take Jeremiyah Love at the 8th pick?! Is Carnell Tate really the WR1 in this draft? We're breaking down all this and so much more! Learn more about your ad choices. Visit megaphone.fm/adchoices
How can we truly trust technology in a world powered by AI and emerging tech? What exactly is medical identity theft, and why should we all be worried about it? And how is the Global Partnership on Artificial Intelligence (GPAI) helping make AI more responsible and fairer?In this episode, Punit Bhatia sits down with Pam Dixon, founder and executive director of the World Privacy Forum, to talk about how we can build trust and protect our privacy in a rapidly changing digital world. They dive into real issues like data misuse, identity theft, and the global efforts shaping stronger privacy and governance standards.
professorjrod@gmail.comData protection didn't fail because encryption was weak; it faltered when trust was broken. In this episode of Technology Tap: CompTIA Study Guide, we explore how scattered systems, third-party vendors, and cloud replication complicate the question, “Where is our data right now?” We discuss why the true solution starts with people, not just technology. Whether you're a professor leading a study group, an IT professional preparing for your CompTIA exam, or anyone invested in IT skills development, this episode offers a practical map to not just pass tech exams but to uphold your promises in data security. Tune in for expert insights on technology education and effective tech exam prep strategies.We break down the crucial difference between data types and classifications, showing why labels don't override laws and how sensitivity should drive controls. You'll hear how data inventories, retention policies, and deletion-by-default strategies reduce both breach blast radius and legal exposure. We get specific about data states—at rest, in motion, in use—and the matching controls that actually hold up under pressure. Then we confront data sovereignty: how cross‑region replicas can quietly violate GDPR and how region‑restricted storage, geofencing, and vendor due diligence keep you on the right side of the border and the law.Privacy takes center stage as we clarify the roles of data subject, controller, and processor, and why documentation beats intention when regulators come calling. We outline what changes when a privacy breach occurs: tight timelines, mandated notifications, and the high cost of silence. Finally, we center the human layer with policies that guide behavior—acceptable use, social media, BYOD, clean desk—and an awareness training lifecycle that adapts to roles and evolving threats. Phishing drills, password hygiene, insider threat cues, and speak‑up culture turn security from slides into habits that stick.If this helped you think differently about compliance, data governance, and human risk, follow the show, share it with a teammate, and leave a quick review telling us which control you'll strengthen first. Your feedback helps more listeners protect what matters most.Support the showArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
What happens when decades of clinical research experience collide with a regulatory environment that is changing faster than ever? In this episode of Tech Talks Daily, I sat down with Dr Werner Engelbrecht, Senior Director of Strategy at Veeva Systems, for a wide-ranging conversation that explores how life sciences organizations across Europe are responding to mounting regulatory pressure, rapid advances in AI, and growing expectations around transparency and patient trust. Werner brings a rare perspective to this discussion. His career spans clinical research, pharmaceutical development, health authorities, and technology strategy, shaped by firsthand experience as an investigator and later as a senior industry leader. That background gives him a grounded, practical view of what is actually changing inside pharma and biotech organizations, beyond the headlines around AI Acts, data rules, and compliance frameworks. We talk openly about why regulations such as GDPR, the EU AI Act, and ACT-EU are creating real pressure for organizations that are already operating in highly controlled environments. But rather than framing compliance as a blocker, Werner explains why this moment presents an opening for better collaboration, stronger data foundations, and more consistent ways of working across internal teams. According to him, the real challenge is less about technology and more about how companies manage data quality, align processes, and break down silos that slow everything from trial setup to regulatory response times. Our conversation also digs into where AI is genuinely making progress today in life sciences and where caution still matters. Werner shares why drug discovery and non-patient-facing use cases are moving faster, while areas like trial execution and real-world patient data still demand stronger evidence, cleaner datasets, and clearer governance. His perspective cuts through hype and focuses on what is realistic in an industry where patient safety remains the defining responsibility. We also explore patient recruitment, decentralized trials, and the growing complexity of diseases themselves. Advances in genomics and diagnostics are reshaping how trials are designed, which in turn raises questions about access to electronic health records, data harmonization across Europe, and the safeguards regulators care about most. Werner connects these dots in a way that highlights both the operational strain and the long-term upside. Toward the end, we look ahead at emerging technologies such as blockchain and connected devices, and how they could strengthen data integrity, monitoring, and regulatory confidence over time. It is a thoughtful discussion that reflects both optimism and realism, rooted in lived experience rather than theory. If you are working anywhere near clinical research, regulatory affairs, or digital transformation in life sciences, this episode offers a clear-eyed view of where the industry stands today and where it may be heading next. How should organizations turn regulation into momentum instead of resistance, and what will it take to earn lasting trust from patients, partners, and regulators alike? Useful Links Connect with Dr Werner Engelbrecht Learn more about Veeva Systems Viva Summit Europe and Viva Summit USA Follow on LinkedIn Thanks to our sponsors, Alcor, for supporting the show.