European Union regulation on the processing of personal data
POPULARITY
Categories
(ADV) Melinda: https://servedby.flashtalking.com/click/1/305361;10602353;50126;211;0/?ft_width=1&ft_height=1&gdpr=${GDPR}&gdpr_consent=${GDPR_CONSENT_78}&us_privacy=${US_PRIVACY}&url=44359789 C&C Live! Pescara: https://www.ticketone.it/event/crime-and-comedy-teatro-cavour-21053456/ Tutte le date Live!: https://www.crimeandcomedy.it/eventi-live/ Ruth Thalía Sayas Sanchez è una ragazza peruviana con grandi sogni e grandi ambizioni. Vede nella partecipazione al nuovo reality show El Valor De La Verdad una scorciatoia per realizzarli. Ma la famiglia di Thalía non si aspetta le verità che la ragazza non ha mai detto e tutto diventa virale, trascinando la Thalía e la sua famiglia in un vortice assurdo che culmina con la scomparsa di Thalía stessa. --------- Patreon: https://www.patreon.com/crimeandcomedy Instagram: https://www.instagram.com/crimeandcomedy.podcast/ Telegram: https://t.me/crimeandcomedy Sito: https://www.crimeandcomedy.it Instagram: Clara Campi: https://www.instagram.com/claracampicomedy/ Marco Champier: https://www.instagram.com/mrchreddy/ Editing - Ilaria Giangrande: https://www.instagram.com/ilaria.giangrande/ Caricature - Giorgio Brambilla: https://www.instagram.com/giorgio_brambilla_bookscomedy/ Capitoli: (00:00:00) | Intro (00:00:31) | Sigla (00:00:45) | Ringraziamenti Patreon (00:04:22) | El Valor De La Verdad un reality show agghiacciante (00:14:44) | Ruth Thalía Sayas Sanchez partecipa a El Valor Del La Verdad (00:33:02) | La scomparsa di Ruth Thalía Sayas Sanchez, tutta colpa della tv spazzatura? (00:55:03) | I nostri Patreon Learn more about your ad choices. Visit megaphone.fm/adchoices
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1Cooterdoodle and Kendall Valenzuela put every major 2026 NFL free agency signing on the fantasy football tier list. From S-tier moves that could create league winners to diabolical signings that tanked a player's value — we're ranking them all and debating the fantasy football fallout.Which free agent landing spots are smash spots for fantasy? Which signings are ADP assassinations? And which move was so bad it earned its own tier? We go position by position through the biggest running back, wide receiver, quarterback, and tight end signings of the 2026 NFL offseason and tell you exactly how to adjust your draft strategy. Topics in this video: NFL free agency 2026, free agency tier list, fantasy football free agency rankings, NFL free agency winners and losers, fantasy football tier list, best free agent signings 2026, worst free agent signings fantasy, NFL free agency fantasy impact, redraft strategy, best ball draft strategy, dynasty fantasy football, free agent landing spots, ADP risers and fallers#NFLFreeAgency #FantasyFootball #TierList #NFLFreeAgency2026 #FantasyFootballRankings #DynastyFantasyFootball #BestBall #NFLOffseason #FreeAgentSignings #FantasyFootballPodcast Learn more about your ad choices. Visit megaphone.fm/adchoices
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1Fantasy football and NFL Draft experts Ian Hartitz and Matthew Freedman go pick by pick through a complete 2026 first round NFL mock draft; fully updated after NFL free agency. With rosters reshaped and team needs completely different, the draft board has shifted. We break down every pick, every landing spot, and every fantasy football implication.How does free agency change who goes where? Jeremiyah Love falls to the Commanders at Pick 7? Carnell Tate drafted earlier than expected to the Giants?! The Chiefs grab Kenyon Sadiq at Pick 9 as Travis Kelce's potential replacement? Topics in this video: 2026 NFL Mock Draft, post-free agency mock draft, NFL Draft 2026, fantasy football mock draft, Jeremiyah Love Titans, Carnell Tate Saints, Kenyon Sadiq Chiefs, Travis Kelce replacement, Omar Cooper Browns, NFL Draft first round, rookie fantasy football rankings, dynasty fantasy football, NFL free agency impact on draft, best ball draft strategy#NFLDraft #2026NFLDraft #MockDraft #NFLFreeAgency #FantasyFootball #DynastyFantasyFootball #NFLMockDraft #RookieRankings #BestBall #FantasyFootballPodcast Learn more about your ad choices. Visit megaphone.fm/adchoices
How is artificial intelligence reshaping the future of crypto and the internet as we know it?In this conversation, Punit and Gokhan explore the current landscape of AI and break down its core concepts in simple terms before diving into the fundamentals of cryptocurrency. The discussion highlights how AI is increasingly shaping the crypto ecosystem, from real-world use cases to the evolution of Web 3.0 and what may come next. The episode concludes with insights into the growing convergence of AI and crypto and how these technologies together are transforming the digital economy.Tune in to gain practical insights, stay ahead of emerging trends, and learn how to get involved in the AI–crypto revolution.KEY CONVERSATION 00:02:09 Gokhan's Introduction 00:03:35 How would you put AI in a few words 00:06:22 What is crypto and what is it all about 00:10:42 What is this web 3.0 or is 4.0 on the way 00:12:09 Cases in which AI is being used in crypto and it's changing the game 00:21:01 What is happening with crypto and AI combined 00:28:25 About Gokhan's podcast 00:31:10 Get in Touch with Gokhan ABOUT THE GUEST Gokhan Polat, a visionary leader on a mission to transform challenges into opportunities and foster growth in every endeavor. With a rich background in strategic growth, risk management, and community building, Gokhan has honed his skills in the dynamic realm of crypto asset services. As a seasoned leader, he navigated the intricacies of enterprise risk management, mastering the art of problem-solving in high-stakes environments. Driven by a profound desire to empower others, Gokhan co-founded the Databulls community, cultivating a vibrant space for learning and collaboration in the tech and business spheres. This experience reinforced his belief in the transformative power of collaboration and shared knowledge. Gokhan leads strategy and business development at his company, where he thrives on crafting and executing ambitious plans that fuel sustainable growth. His strategic acumen and collaborative approach empower teams to surpass expectations and achieve remarkable results. Gokhan's leadership style is characterized by a human touch, fostering strong, motivated teams through open communication, trust, and a focus on personal development. With strategic foresight, he translates vision into actionable plans, driving growth and maximizing team potential. His deep industry knowledge, spanning both crypto and professional services, equips him with invaluable insights into diverse domains. Gokhan is a champion of community, believing in the transformative power of collaboration and meaningful connections. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR'' which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites www.fit4privacy.com,www.punitbhatia.com, https://growskills.store/ Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy Insights https://growskills.store/insights/ ISO Standard Courses at https://growskills.store/courses/
Ray Eitel-Porter, former Global Lead for Responsible AI at Accenture and co-author of the new book, Governing the Machine, discusses how enterprises can move from abstract AI principles to practical governance. He emphasizes that organizations can only realize AI's benefits if responsibility is embedded into everyday business processes rather than treated as a standalone compliance exercise. Drawing on his experience leading global data and AI programs, Eitel-Porter explains how the release of ChatGPT transformed enterprise attitudes toward AI, accelerating adoption while exposing risks such as hallucinations, reliability failures, and reputational harm. Effective governance has evolved from static principles to operational controls, including workflow checkpoints, red teaming, and technical guardrails, particularly for generative AI systems with inherently probabilistic outputs. On risk, he stresses that not all AI use cases require the same level of scrutiny; governance should scale with potential impact and harm, focusing on what an AI system is intended to do so that non-technical teams can surface high-risk use cases without incentives to downplay risk. On regulation, Eitel-Porter notes that despite uncertainty around the EU AI Act, many multinational companies are treating it as a global baseline, similar to GDPR, while contrasting this with more deregulatory signals from the United States and questioning the global influence of the UK's middle-ground approach. He also shares insights from Governing the Machine, co-authored with Miriam Bogle and Paul Donkhan, emphasizing that AI governance is not a barrier to innovation but the foundation that allows organizations to deploy AI at scale with confidence and control. Ray Eitel-Porter is a Senior Advisor at Accenture and the former Global Lead for Responsible AI, where he designed and scaled AI governance programs for multinational organizations. He previously led Accenture's data and AI practice in the UK and has over a decade of experience advising companies on responsible AI, data governance, and emerging technology risk. Eitel-Porter is the co-author of Governing the Machine: How to Navigate the Risks of AI and Unlock Its True Potential (Bloomsbury, 2025) and has led multi-year programs across public and private sectors, including global banks, retailers, and health brands. Transcript Governing the Machine (Bloomsbury 2025) Lessons from the Frontline – Designing and Implementing AI Governance (AI Journal)
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee. https://ad.doubleclick.net/ddm/trackc...[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1 The Fantasy Life Show is LIVE for Day 1 of NFL free agency. Fantasy football experts Ian Hartitz and Dwain McFarland are breaking down every signing, every trade, every deal — broken down in real time with instant fantasy football analysis. Who are the biggest winners and losers? Which landing spots change your draft strategy? We're covering it all as it happens. Join Ian Hartitz and Dwain McFarland as we react to every major move and break down the fantasy football implications for redraft, Guillotine Leagues, best ball, and dynasty leagues. Today's moves include: Malik Willis signing with the Dolphins Tua Tagovailoa signing with the Falcons Alec PIerce staying with the Colts Michael Pittman traded to the Steelers Mike Evans signing with the 49ers Wan'Dale Robinson signing with the Titans Kenneth Walker signing with the Chiefs Travis Etienne signing with the Saints Kenneth Gainwell signing with the Buccaneers Tyler Allgeier signing with the Cardinals J.K. Dobbins resigning with the Broncos Isaiah Likely signing with the Giants Travis Kelce coming back for another year? NFL free agency 2026, NFL free agency live, free agency signings, fantasy football free agency, fantasy football winners and losers, NFL free agency reactions, free agent landing spots, best ball draft strategy, dynasty fantasy football, NFL free agency day 1, fantasy football live stream, NFL trades, free agency tracker Learn more about your ad choices. Visit megaphone.fm/adchoices
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee. https://ad.doubleclick.net/ddm/trackc...[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1 The Fantasy Life Show is LIVE for Day 2 of NFL free agency. Fantasy football experts Ian Hartitz and Kendall Valenzuela are breaking down every signing, every trade, every deal — broken down in real time with instant fantasy football analysis. Who are the biggest winners and losers? Which landing spots change your draft strategy? We're covering it all as it happens. Join Ian Hartitz and Kendall Valenzuela as we react to every major move and break down the fantasy football implications for redraft, Guillotine Leagues, best ball, and dynasty leagues.
Looks like it's a GDPR issue. Sponsored by Riverside. Riverside now offers Podcast Hosting. Record, edit, and publish to Spotify, Apple, YouTube, and more, all from the same platform. Host where you record. https://podnews.net/cc/3356 Visit https://podnews.net/update/podbean-switches-off-dai for the story links in full, and to get our daily newsletter.
Finding European software alternatives to standard non European software is flavour of the month this side of the Altlantic. With geopolitical certainties dissolving faster than annual licence renewals, B2B firms are waking up to a question they had conveniently parked for years: just how dependent are they on their current software stack? Salesforce, Microsoft 365, Google Workspace, HubSpot — tools so deeply embedded in daily operations that their vulnerability tends to get overlooked. This article doesn’t pretend to hand you a ready-made list of the best European software alternatives; that would be both arrogant and futile. What it does offer is a framework — rational, professional, free of any ideological baggage — to help decision-makers take an honest look at their exposure and find credible ways forward. Keep calm and select new software vendors sort of thing. European software alternatives for businesses European software alternatives are all anyone wants to talk about right now. To cut through the ideological noise, here is a practical methodology and a few things worth watching out for. Image antimuseum.com I put these ideas together ahead of a webinar I’m running on LinkedIn on 12 March, as a way of getting my thoughts in order. None of this is meant as a final word on the subject — more the opening of a conversation that matters to a growing number of professionals who, like the rest of us, are navigating a period of upheaval in which nothing can be taken for granted, software choices included. The 12 March webinar on European software alternatives to Salesforce and HubSpot I’ve made a lot of software choices over the years, and the one thing that has always struck me is just how much methodology matters if you want choices that actually hold up over time. Easier said than done, mind you — there are a great many criteria to weigh up, and some of them are genuinely tricky to pin down. Long-term viability is a good example: normally near the top of any procurement checklist, it takes on a whole different meaning when the possibility of having your access switched off overnight is no longer hypothetical. With European software alternatives, the real question isn’t how to break free from your chains — it’s which new chains you’d rather wear Picking a software suite is never straightforward at the best of times. In the current climate — where the ground can shift completely without a moment’s notice — it demands even more careful thought. Sovereignty, sovereignism, or simply prudence? Let me be clear from the outset: my take here is professional and rational, not political. Politics doesn’t interest me in this context. I have no intention of evaluating software alternatives through any ideological prism — what I’m after is the kind of clear-headed thinking you’d apply to a crisis management scenario. The goal, to borrow the term favoured by Nassim Nicholas Taleb, is to bring an antifragile lens to the question. The scope of European software alternatives My focus has been on MarTech, SalesTech and office productivity tools in the broadest sense — cloud storage and archiving included. The webinar title calls out Salesforce and HubSpot specifically, but as far as I’m concerned the issue runs much deeper than that. The same methodology can easily stretch into more industry-specific territory too, given how thoroughly technology now underpins B2B operations — from the till at your local baker’s or restaurant through to the most complex design and production platforms imaginable. Thinking it through, I also realised you can’t really ignore operating systems. What use is an application that won’t run on your users’ machines — or worse, one that runs perfectly but quietly leaves the door open to security vulnerabilities? Good old Europe — 27 countries, 24 official languages, and 27 different national transpositions of EU law. Would a Hungarian or Czech software vendor actually be safer than an independent American one? When it comes to European software alternatives, that’s still very much an open question… Urgency — dependency and threat assessment The starting point, in my view, is to get a clear picture of how exposed you actually are — both in terms of dependency and of what cybersecurity people would call the “threat level.” Are you locked in, or not? Can you get your data out if you need to? Those are the questions to tackle first. Then comes the threat itself: are you facing something urgent, or is this more a matter of sensible contingency planning? Committing to a software suite is a serious business. Jumping ship to something purely because it comes from a country you currently trust is not a strategy. Take Switzerland — long held up across Western Europe as the gold standard for data privacy. A legislative change currently working its way through the Swiss system has rattled enough cages for several companies, Proton among them, to start exploring moving their hosting elsewhere. Which only goes to show why knee-jerk decisions are so dangerous. Even a country with an impeccable track record — Germany, France, take your pick — can turn into a risk overnight following a change of government, a constitutional shift, or simply a new piece of legislation. Avoiding “sovereignty washing” As I said above, ideology needs to stay out of it. Keep it rational. Which means not falling for the trap of rushing towards any vendor simply because it sounds German — or any other nationality — when a closer look at its foreign operations or its parent group reveals that its much-vaunted independence is largely theoretical. Priorities — data and software One of the first things I learnt when I started out as an IT project owner was to keep data and software firmly separate in my thinking. At the end of the day, what matters more — Salesforce the tool, or your customer database? As with most IT projects, the real priority is sorting out your data archiving and portability strategy first. Time Timing matters enormously. There’s a palpable sense of urgency in the air right now, and understandably so — but it mustn’t blind us to the longer view. Technology has its own history, and that history tends to play out over years, not weeks. Which is precisely why a medium-to-long-term approach makes sense: getting users to change their habits takes time and energy at the best of times. The roadmap, as I see it, is fairly straightforward: start by archiving, securing and preparing your data for portability. Then find alternatives that are genuinely credible and built to last. And crucially, take your users with you — because if you don’t, the classic BYOD shadow IT problem will rear its head. When people can’t find what they need inside the company, they go and find it on the internet, quietly, without telling anyone. I’m reminded of a story from a major European aerospace company, where the CEO — right in the middle of a high-security defence messaging rollout — demanded that his own emails be redirected to… Yahoo! The European software alternatives comparison table I put together a comparison table with a little help from claude.ai. And I’ll say it again: this is not a finished product. Think of it as a working matrix — something to make your own, adapt, keep updated, and cross-check carefully. The exercise turned up a few surprises: mapp.com, for instance, gets labelled as a German solution, when in reality it was a German company bought by an American one — Mapp Digital emerged from the merger of Teradata’s and BlueHornet Networks’ marketing businesses through a US investment fund. There are also plenty of criteria missing from this table — ones that will depend entirely on your project, your context and, of course, your budget. Disclaimer: the table below is a working matrix, not a final verdict. It scores the main B2B software tools across productivity, MarTech and SalesTech on two dimensions: a dependency score (technical lock-in, data portability, migration cost) and a risk score (CLOUD Act exposure, data sensitivity, GDPR compliance, geopolitical risk). For each category, European alternatives are flagged — with no illusions: some vendors that bill themselves as “European” turn out, on closer inspection, to be owned by non-EU groups, which rather undermines their claims to independence. The approach is deliberately rational and professional — no axes to grind. The point isn’t to tell you what to choose, but to give you a framework to think it through — one you can combine with your own criteria around context, budget and use case — as a starting point for an honest review of your software ecosystem’s resilience. The European software alternatives table — download, adapt and make it your own Download the EXCEL file as b2b_software_ranking_EN_v2Download The post European software alternatives for businesses appeared first on Marketing and Innovation.
Is AI Governance the new "must-have" for cybersecurity professionals? As AI transitions from a luxury to a corporate mandate, the need for certified experts to manage risk and compliance is skyrocketing. In this episode, we break down everything you need to know about the IAPP AIGP certification, the globally recognized gold standard for governing artificial intelligence.Join the experts at InfosecTrain as we navigate the intersection of AI, data privacy (GDPR), and information security. Whether you are a risk manager, a privacy officer, or a tech enthusiast, this guide provides the strategy and mindset needed to master the AIGP exam and lead in the AI-driven IT service industry.Inside This Episode:The AIGP Value Proposition: Why AIGP is becoming a de facto requirement for AI governance roles.Beyond the Code: Why you don't need to be a developer to excel in AI governance.The Three Pillars: Understanding the critical intersection of Privacy, AI Governance, and Information Security.Exam Flavors & Bias: A deep dive into temporal bias, sampling bias, and how they impact regulatory compliance.Governance Models: Comparing Centralized, Decentralized, and Hybrid models for your organization.The "Black Box" Challenge: Tackling explainability and automated decision-making under GDPR.Pro Exam Tips: How to handle case studies and the mindset of an AI Risk Manager.
How does Google Consent Mode affect ePrivacy compliance, opt-in signals, traffic sampling, marketing performance, and CIPA claims? What are the most common technical mistakes in the configuration of Tag Managers, tracking rules, and consent banners? Where is “do not train” (LLMs) going? Does agentic traffic ruin analytics or the premises of consent?We have gone through all of this with a true Google Analytics, Google Tag Manager, and website auditing expert.Phil Pearce is founder of MeasureMinds and creator of ConsentModeMonitor. He started in paid search for CreditCards.com managing a multi-million dollar PPC account, before shifting to Privacy & Analytics about 8 years ago, when he did a series of talks about Black Hat Analytics. More recently, he has been helping brands with technical defence against CIPA & ePrivacy/PECR and GDPR claims. Prior to building his business, Phil worked for ConversionWorks, Jellyfish & Sitemakers as a Google Analytics and Search Specialist. He is a top authority in Google Analytics and Google Tag Manager and is the author of the GTM developer guide as well as host of the GA4ward, GTM4ward and Privacy4Marketers conferences.References:* Phil Pearce on LinkedIn* Consent Mode Monitor (Masters of Privacy Toolbox), free website scans for three months* Compliance Briefs (Masters of Privacy Toolbox), $500 discount for our listeners* Lineberry v. AddShopper, Inc. (3:23-cv-01996), May 29, 2025* MCP Manager by Usercentrics* Introducing DPO Central: AI-powered privacy program management* Sealmetrics: cookieless, consentless analytics This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.mastersofprivacy.com/subscribe
(ADV) Melinda: https://servedby.flashtalking.com/click/1/305361;10602353;50126;211;0/?ft_width=1&ft_height=1&gdpr=${GDPR}&gdpr_consent=${GDPR_CONSENT_78}&us_privacy=${US_PRIVACY}&url=44359789 (ADV) NordVPN: https://nordvpn.com/crimeandcomedy C&C Live! Roma: https://teatroservi.vivaticket.it/it/event/ee-08-crime-comedy/272273 Tutte le date Live!: https://www.crimeandcomedy.it/eventi-live/ icholas Barclay ha solo 13 anni quando scompare nel nulla da San Antonio, Texas, nel 1994. Ma tre anni dopo Beverly, sua madre, riceve una telefonata incredibile: Nicholas è vivo, ed è in Spagna. Una storia a lieto fine... O forse no? E chi è Frédéric Bourdin? --------- Patreon: https://www.patreon.com/crimeandcomedy Instagram: https://www.instagram.com/crimeandcomedy.podcast/ Telegram: https://t.me/crimeandcomedy Sito: https://www.crimeandcomedy.it Instagram: Clara Campi: https://www.instagram.com/claracampicomedy/ Marco Champier: https://www.instagram.com/mrchreddy/ Editing - Ilaria Giangrande: https://www.instagram.com/ilaria.giangrande/ Caricature - Giorgio Brambilla: https://www.instagram.com/giorgio_brambilla_bookscomedy/ Capitoli: (00:00:00) | Intro (00:00:21) | Sigla (00:00:35) | Ringraziamenti Patreon (00:03:49) | Mr Beast e Matrimoni (00:06:47) | Nicholas Barclay e la storia della sua famiglia (00:26:57) | La scomparsa di Nicolas Barclay (01:04:19) | NordVPN (01:05:50) | Nicholas Barclay torna a casa, ma qualcosa non quadra (01:33:39) | Frédéric Bourdin: il Camaleonte (01:58:53) | L'arresto di Frédéric Bourdin (02:19:52) | I nostri Patreon Learn more about your ad choices. Visit megaphone.fm/adchoices
How is artificial intelligence reshaping the future of crypto and the internet as we know it? In this conversation, Punit and Gokhan explore the current landscape of AI and break down its core concepts in simple terms before diving into the fundamentals of cryptocurrency. The discussion highlights how AI is increasingly shaping the crypto ecosystem, from real-world use cases to the evolution of Web 3.0 and what may come next. The episode concludes with insights into the growing convergence of AI and crypto and how these technologies together are transforming the digital economy. Tune in to gain practical insights, stay ahead of emerging trends, and learn how to get involved in the AI–crypto revolution.KEY CONVERSATION 00:02:09 Gokhan's Introduction 00:03:35 How would you put AI in a few words 00:06:22 What is crypto and what is it all about 00:10:42 What is this web 3.0 or is 4.0 on the way 00:12:09 Cases in which AI is being used in crypto and it's changing the game 00:21:01 What is happening with crypto and AI combined 00:28:25 About Gokhan's podcast 00:31:10 Get in Touch with Gokhan ABOUT THE GUEST Gokhan Polat, a visionary leader on a mission to transform challenges into opportunities and foster growth in every endeavor. With a rich background in strategic growth, risk management, and community building, Gokhan has honed his skills in the dynamic realm of crypto asset services. As a seasoned leader, he navigated the intricacies of enterprise risk management, mastering the art of problem-solving in high-stakes environments. Driven by a profound desire to empower others, Gokhan co-founded the Databulls community, cultivating a vibrant space for learning and collaboration in the tech and business spheres. This experience reinforced his belief in the transformative power of collaboration and shared knowledge. Gokhan leads strategy and business development at his company, where he thrives on crafting and executing ambitious plans that fuel sustainable growth. His strategic acumen and collaborative approach empower teams to surpass expectations and achieve remarkable results. Gokhan's leadership style is characterized by a human touch, fostering strong, motivated teams through open communication, trust, and a focus on personal development. With strategic foresight, he translates vision into actionable plans, driving growth and maximizing team potential. His deep industry knowledge, spanning both crypto and professional services, equips him with invaluable insights into diverse domains. Gokhan is a champion of community, believing in the transformative power of collaboration and meaningful connections. ABOUT THE HOST Punit Bhatia is one of the leading privacy experts who works independently and has worked with professionals in over 30 countries. Punit works with business and privacy leaders to create an organization culture with high privacy awareness and compliance as a business priority. Selectively, Punit is open to mentor and coach privacy professionals. Punit is the author of books “Be Ready for GDPR'' which was rated as the best GDPR Book, “AI & Privacy – How to Find Balance”, “Intro To GDPR”, and “Be an Effective DPO”. Punit is a global speaker who has spoken at over 30 global events. Punit is the creator and host of the FIT4PRIVACY Podcast. This podcast has been featured amongst top GDPR and privacy podcasts. As a person, Punit is an avid thinker and believes in thinking, believing, and acting in line with one's value to have joy in life. He has developed the philosophy named ‘ABC for joy of life' which passionately shares. Punit is based out of Belgium, the heart of Europe. RESOURCES Websites www.fit4privacy.com,www.punitbhatia.com, https://growskills.store/ Podcast https://www.fit4privacy.com/podcast Blog https://www.fit4privacy.com/blog YouTube http://youtube.com/fit4privacy Insights https://growskills.store/insights/ ISO Standard Courses at https://growskills.store/courses/
AI regulatory enforcement is accelerating – often under laws that were conceived well before the unstoppable emergence of AI. This episode of The Data Chronicles examines how regulators and courts across Europe and beyond are applying existing frameworks, from the GDPR to consumer and competition law, to AI development and deployment. We explore emerging enforcement patterns, including scrutiny of AI training data, transparency obligations, data subject rights, and the growing use of urgent regulatory measures. The discussion also looks ahead to how enforcement may evolve as AI-specific regulation advances, and what these developments signal for organizations operating globally.
Guest post Martin Petrov, Chief Technology Officer, Payments Compliance at Integrity360 It is tempting to view payments compliance as the finish line, a signal that a business is secure. But in practice, compliance is just the starting point. It provides a baseline security level, not a digital fortress. Standards are designed to raise the floor and eliminate obvious vulnerabilities, but they cannot cover every emerging threat or nuance – such as a supplier getting breached or a shortcut taken by an engineer at 2 a.m. That is where organisations risk becoming complacent or overly literal in their interpretations. True security demands a harder question than: "Are we compliant"? It demands: "Would this stop an attacker today?" That demands understanding not just what control requirements state, but why they exist. Multi-factor authentication (MFA), for example, is not just a checkbox; it is a concept rooted in stopping unauthorised access. Compliance must be interpreted in context: against the weakest vendor, the most exposed system, the riskiest business process, and the evolving threat landscape. Too many breaches have exploited gaps that audits never covered because compliance became the ceiling, not the floor. Regional and cultural factors also play a part. In Northern Europe, payments compliance frameworks like PCI DSS are often seen as a baseline to exceed, with layered defences added beyond the minimum. In other regions, standards such as PCI DSS or ISO/IEC 27001 are treated more as a destination. Certification becomes the end goal – a badge to display, not a baseline to exceed. These differences matter because they determine whether compliance protects you or just protects your reputation. The supplier slip-up that could cost you everything One of the most urgent blind spots is the supply chain. You can harden and patch all of your own systems, mandate MFA, and lock down every endpoint. But a vendor's default service account, an abandoned test tenant, or an over-permissioned API can undermine everything. As integrations and dependencies grow, so does the potential blast radius. And while many organisations know who their suppliers are, far fewer know what access they have, how often they are reviewed, or whether they follow the same standards. Supplier risk must now be managed as rigorously as internal operations; tiered, tested, and tightly controlled. The three-body problem: when PCI DSS, GDPR, and the EU AI Act collide Then there is the pace of innovation, particularly in areas like artificial intelligence (AI). For European compliance officers, this creates a three-body problem: the EU AI Act, PCI DSS, and GDPR orbiting each other with overlapping – but misaligned – requirements. And unlike physics, there is no elegant equation to solve it. Meanwhile, global response remains inconsistent, and the tension between innovation and oversight is only going to grow. The organisations that succeed in this environment will not just meet standards; they will go further and question whether they are compliant on paper but vulnerable in practice. By treating compliance as a foundation, not a finish line, organisations will unlock new ways to stay secure and trusted. The question is, what does that really look like? What good is a lock if no one checks the door? One of the easiest traps for modern security teams is assuming that tools alone provide protection. But no matter how advanced the platform or how rigid the policy, it is people and processes that hold it all together – or let it fall apart. This is especially true in payments compliance, where new platforms and integrations emerge faster than policies can adapt. Organisations that treat compliance as a checklist often over-rely on technology, by trusting automated scans, secure settings, or third-party certifications to keep them safe. But without context and human judgement, these defences can create a false sense of security and leave the business exposed. In the b...
In this second part of our conversation on hostile acquisitions and digital governance, we shift the focus toward regulatory compliance and its growing impact on multinational enterprises (MNEs). With Juan Camilo Bolívar Sánchez, we examine how evolving regulatory frameworks such as the GDPR in Europe and the CCPA in the United States are reshaping the operational strategies of global technology firms.Drawing from his experience at TikTok in France and Belgium, Bolívar explains the practical challenges of navigating regulatory fragmentation across jurisdictions and the commercial implications of managing data protection, contract negotiations, and compliance risks in different legal environments. We explore how regulatory divergence affects business models, operational costs, and competitive positioning, and what this means for the future of cross-border digital operations.Join us as we analyze how compliance is no longer just a legal requirement, but a strategic dimension of international business in the digital era.
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1We're back with another episode of Fantasy Life with Ian Hartitz and in today's episode Ian is joined by fantasy football expert Dwain "The Rock" McFarland to break down everything you need to know about the wide receiver position heading into NFL free agency.This offseason's wide receiver free agent class is maybe not as deep as some may like — buit where these players end up will completely reshape fantasy football drafts for 2026.We break down every WR that matters this offseason, from the headliners to the names flying under the radar. For each player, we cover what they did in 2025, the landing spots that make sense, and what it all means for your fantasy team next season.In today's episode: Is Alec Pierce really the best free agent WR? Are the Bills honing in on Rashid Shaheed? Can Mike Evans produce somewhere other than Tampa? We're breaking down all this and so much more! Learn more about your ad choices. Visit megaphone.fm/adchoices
Rob McDonald, SVP of Platform at Virtru joins the podcast to double-click into the privacy and data discussion. We explore subsidizing the pain of giving personal data in exchange for 'free' services, informed consent, regulation alone isn't a silver bullet, and what outcomes we could we drive when we combine user decisions with regulation. And he shares insights on behaviors that come with innovation, data as common denominator, regulations such as GDPR and CCPA as progress markers (and not the final destination), the criticality of the CIO/CISO as storyteller and recognizing our front line defenders are people (not robots!). Rob McDonald, SVP Plaftorm at Virtru Rob is the SVP of Platform and an advocate of safeguarding data across new applications and data-sharing workflows. Prior to Virtru, Rob was the CIO for several Acute Care facilities and Denovo Healthcare development teams. His significant expertise in the healthcare industry earned him a spot in Becker's Review as a 2013 and 2014 Top 100 Healthcare CIOs. Rob has also consulted with corporations to help them assess their current information security position and develop a plan to not only mitigate the discovered technical shortcomings but more critically to raise security awareness amongst their employees. Rob holds a Bachelor of Science degree in Computer Science from the University of Texas at Dallas and is a perpetual student of technology, information security, and privacy practices. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e374
Washington has given 24 EU member an ultimatum: Open your biometric databases to American border officials or lose visa-free travel. In this video, IMI reveals what data is on the table, why not a single EU government objected, and what the US government's algorithms mean for every European traveler.Read the full article with details here.
ADV - Incogni: https://incogni.com/crimeandcomedy ADV - Melinda: https://servedby.flashtalking.com/click/1/305361;10602353;50126;211;0/?ft_width=1&ft_height=1&gdpr=${GDPR}&gdpr_consent=${GDPR_CONSENT_78}&us_privacy=${US_PRIVACY}&url=44359789 C&C Live! Roma: https://teatroservi.vivaticket.it/it/event/ee-08-crime-comedy/272273 Tutte le date Live!: https://www.crimeandcomedy.it/eventi-live/ Jane Toppan è stata soprannominata Jolly Jane dai suoi colleghi, perché è un'allegra infermiera, amichevole con tutti, simpatica, sempre sorridente e incline allo scherzo. Anche se la sua vita prima di diventare infermiera è stata un mezzo inferno. Però ora si sta riscattando, e sembra andare tutto bene, almeno finché qualcuno si accorge che intorno a Jolly Jane muoiono un po' troppe persone. --------- Patreon: https://www.patreon.com/crimeandcomedy Instagram: https://www.instagram.com/crimeandcomedy.podcast/ Telegram: https://t.me/crimeandcomedy Sito: https://www.crimeandcomedy.it Instagram: Clara Campi: https://www.instagram.com/claracampicomedy/ Marco Champier: https://www.instagram.com/mrchreddy/ Editing - Ilaria Giangrande: https://www.instagram.com/ilaria.giangrande/ Caricature - Giorgio Brambilla: https://www.instagram.com/giorgio_brambilla_bookscomedy/ Capitoli: (00:00:00) | Intro (00:00:23) | Sigla (00:00:37) | Ringraziamenti Patreon (00:05:14) | Jolly Jane Toppan, un'infanzia disastrosa (00:08:57) | Incogni (00:10:31) | L'adozione di Jolly Jane Toppan (00:31:47) | Jolly Jane Toppan un'infermiera perfetta (00:46:43) | Troppe morti poratano all'arresto di Jolly Jane Toppan (01:25:05) | I nostri Patreon Learn more about your ad choices. Visit megaphone.fm/adchoices
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1Dwain McFarland joins fantasy football expert Ian Hartitz on the show to unveil his Rookie WR Super Model for the 2026 NFL Draft class. We break down what the model looks for, its historical hit rates, and then go prospect-by-prospect through the top names: Carnell Tate, Jordyn Tyson, Makai Lemon, KC Concepcion, Denzel Boston, Elijah Sarratt, and Omar Cooper — the good, the not-so-good, and the comps. (edited) Learn more about your ad choices. Visit megaphone.fm/adchoices
AI is transforming the world—but is it transforming privacy for better or for risk? We trust our GP with our deepest secrets, but can we extend that same trust to AI-powered systems and cloud-based suppliers? And if AI can re-identify people even in anonymized research data, is “anonymous” still real anymore? In this episode, Punit Bhatia and Tania Palmariellodiviney reveals how AI tools reshape confidentiality, integrity, availability, cloud sprawl, supplier risk, clinical transcription accuracy, re-identification, and even personal fears like voice-based deepfakes. The voice of experience rings clear: digital trust isn't a checkbox…it's engineered early with transparency, responsible data use, privacy by design, and safety by design.
How real-time security transforms ERP systems in a cloud-driven world, spotting threats instantly, leveraging AI for proactive defense, and closing common blind spots before breaches escalate. Curious about staying ahead of cyber risks?=====Mohammed Moidheen, SAP security architect at Infosys, unpacks why real-time monitoring is vital amid 2,200 daily cyber attacks costing trillions annually. He highlights blind spots like unmonitored access vulnerabilities, ignored audit logs, unsecured APIs, privileged accounts, insider threats, and poor event correlation in S/4HANA Cloud setups. AI evolves detection with predictive intelligence, automated responses, natural language queries, and cross-system pattern spotting, shifting from reactive to proactive security. Real-world cases show systems halting unusual data downloads and insider data exfiltration in minutes. Advice includes aligning with governance, prioritizing crown jewels, setting baselines, training teams, and correlating data. Infosys aids via assessments and foundational builds.Listen now and rethink what ERP can do for your organization!Download Episode TranscriptUseful Links: SAP Cloud ERPInfosys.comFollow Us on Social Media!SAP S/4HANA Cloud ERP: LinkedIn=====Guest: Mohammed Khan Moidheen, SAP Security Architect at Infosys ConsultingMohammed Khan Moidheen is a Senior SAP Security architect with over 12 years of experience securing and operating large scale SAP landscapes across global enterprises. His expertise spans SAP S/4HANA security, ERP platform services, DevSecOps enablement, and designing audit ready security architectures aligned with frameworks such as ISO 27001, NIST, and GDPR.Mohammed is CISSP and CISA certified and I excel at translating complex security requirements into actionable strategies that are practical , strategically aligned and strengthen organisational resilience.Host 1: Richard Howells, SAPRichard Howells has been working in the Supply Chain Management and Manufacturing space for over 30 years. He is responsible for driving the thought leadership and awareness of SAP's ERP, Finance, and Supply Chain solutions and is an active writer, podcaster, and thought leader on the topics of supply chain, Industry 4.0, digitization, and sustainability.Follow Richard Howell on LinkedIn and XHost 2: Oyku Ilgar, SAPOyku Ilgar is a marketer and thought leader specializing in SAP's digital supply chain and ERP solutions since 2017. As a marketer, blogger, and podcaster, she creates engaging content that highlights innovative SAP technologies and explores key topics including business trends, AI, Industry 4.0, and sustainability.She holds dual bachelor's degrees in Finance & Accounting and English Translation, along with a master's degree in Business Administration and Foreign Trade, specializing in marketing. With her background in digital transformation, Oyku communicates technology trends and industry insights to help professionals navigate the evolving business landscape.Oyku's LinkedIn and SAP Community=====Key Topics: real-time security, ERP monitoring, cloud threats, SAP S/4HANA, access management, audit logs, AI threat detection, insider threats, privileged accounts, predictive intelligence
The modern automotive industry faces many new challenges, as vehicles evolve with more complex data requirements and supply chains become increasingly interconnected, major Original Equipment Manufacturers (OEMs) require certain Standards as a mark of trust from potential suppliers. Currently, this trust is codified in TISAX (Trusted Information Security Assessment Exchange). For businesses that have not previously dealt with Standards, TISAX can be seen as a daunting regulatory hurdle. However, a TISAX label is more than a compliance check, it's a recognised mark that your organisation has robust information security measures in place specific to the automotive industry, including considerations for protecting key intellectual property and prototype innovations. In this episode, Ian Battersby is joined by Emma Coxhill, isologist at Blackmores, to explore what TISAX is, who it applies to, what it requires and how OEM's and automotive suppliers can take their first steps towards earning a TISAX label. You'll learn · What is TISAX? · Who is TISAX applicable to? · Why is TISAX important? · What are the 3 assessment levels within TISAX? · What are the 3 different subject areas within TISAX? · How is TISAX implemented? · Why does TISAX use labels instead of certificates – and how can people verify these? · What is the ENX portal and how does this help with supplier onboarding? · Where should companies start if they want to earn a TISAX label? Resources · Register for our TISAX webinar here · ENX · Isologyhub In this episode, we talk about: [02:05] Episode Summary – Emma Coxhill joins Ian to dive into the topic of TISAX, including who it's applicable to, why it's important and how businesses can make a start on earning a TISAX label. [03:40] What is TISAX? TISAX was developed for the automotive industry by the German Association of the Automotive Industry, VDA, and it's managed by the ENX Association. It's based on the ISO 27001 Annex A controls, and was created for the automotive industry because they were looking to standardise the framework for assessing and sharing information security results between manufacturers and their suppliers. [04:40] Who is TISAX applicable to? While applicable to the automotive industry, it encompasses quite a lot of businesses within this. This is because is applies to any organisation that handles sensitive data relating to vehicle development, manufacture and marketing. So, this can include any company providing car parts, vehicle software, cloud services, testing labs, engineering etc. Basically, any service providers to OEMs (original equipment manufacturers) will be applicable. TISAX can also be applicable for those dealing with automotive related events, marketing and photography, as new models are protected IP and will require related business to prove that they have the correct security requirements to ensure any potential prototypes are protected. [06:50] Why is TISAX important? Mainly, it gives the automotive industry a trusted, standardised way to ensure information security across the entire supply chain. Without it, the OEMs and suppliers can conduct their own audits, but it'll be their own interpretations or what is considered an adequate level of security. The industry saw this as an open door to chaos, so TISAX was created to protect highly confidential automotive information and support compliance with relevant data protection laws. However, now it's not so much a 'nice to have' Standard as it is a requirement to trade, especially within Europe. It's fast becoming a tender requirement, and many OEMs won't make it past the procurement process without a valid TISAX label. The ENX portal, where labels are registered, can also help speed up the on-boarding process. So, the whole TISAX system has been built for ease of access to help manufacturers choose suppliers that prioritise information security. [09:00] What's the consequence of not having a TISAX label? A loss of opportunities. Those within the automotive industry that don't have a valid label will be seen as a security risk, leaving them at a competitive disadvantage. [10:30] What are the 3 levels within TISAX? Unlike ISO 27001, TISAX has levels that depend on the level of data sensitivity that you're dealing with. Level 1: Self-assessment – Considered as 'normal risk' with general processing of data. Level 2: Remote Audit – Applicable to those dealing with confidential information such as design documents or internal projects. This requires both a self-assessment and an audit. Level 3: On-site Assessment – Highly confidential information, so this applies to those dealing with sensitive research, development information or prototype data etc. This requires a physical on-site assessment, as the qualified TISAX auditor will need to ensure that you have the appropriate physical security measures in place. Most businesses will require level 2, but if you're looking to work with high-spec OEMs, then level 3 is more desirable. [12:00] What are the 3 subject areas within TISAX? The 3 main areas are as follows: Information Security: This covers general information security controls such as relevant policies, access controls, risk management, incident handling and secure operations. Prototype Protection: This focuses on safeguarding physical and digital prototypes, design data, test vehicles and confidential development information. Data Protection: This ensures proper handling of personal data in line with legal requirements such as GDPR. If you're just doing a self-assessment, you can pick the areas which are most relevant to you. If you've been requested to earn a TISAX label, they will usually provide you with their preference on subject areas. Many will opt to take information security, but data protection is also quite common. The prototype section is more specialist and not applicable to all businesses. [14:00] How is TISAX implemented? There are a few stages to gaining a TISAX label: Awareness – Learn the requirements for TISAX and planning for the project ahead. This may include asking your clients about what they expect of your from an information security perspective and working out costs for assessments and any additional support. The ENX website has a lot of really useful info, including a handbook and a copy of the self-assessment. Preparation – This is where you need to complete your TISAX scope and register yourself on the ENX portal. Your scope needs to specify your selected level (1,2 or 3) and the subject areas you'll be focusing on. You also need to include the locations within scope, which have to be listed one by one (not simply 'all offices in the UK' for example). Self-Assessment – The template for this can be downloaded from the ENX website. This is essentially a Gap Analysis that grades your current level of compliance with the TISAX requirements. It includes a scoring mechanism, where you'll be aiming to get a 2.71, as that's the pass rate. This self-assessment will highlight what gaps you need to fill before going ahead with an external assessment. Implementation – This is where you will bridge those gaps highlighted in the Self-assessment. This will involve creating the required documentation requested by TISAX and updating existing systems to align with requirements. Before going ahead with external assessments, we highly recommend you conduct some internal audits to ensure you're ready. External Assessment – Whether this is remote or on-site, you need an official TISAX auditor to perform the assessment. A list of approved TISAX auditors is available on the ENX portal, we recommend getting a few quotes to get the best price. We also recommend requesting a kick-off meeting so you can have a chat with your auditor about the requirements and how they'd like to review the required evidence of compliance. The Assessments are similar to that of an ISO certification, it's broken down into 2 segments. One is a document/evidence review and the other is done with both parties present to go through their findings, review further evidence and to question any gaps found. Again, similar to ISO, you may receive either minor non-conformities, non-conformities, opportunities for improvement or observations in their final report. If you get any non-conformities, you'll need to provide an action plan within 2 weeks following from your assessment to address them. You will then be allowed a few months to implement the corrections, which will be reviewed and approved by the auditor before receiving your label. If you only received opportunities for improvement then you'll get a label straight away. [20:40] Why does TISAX use labels instead of certificates – and how can people verify these? Taking ISO 27001 as a comparison, that certification has a blanket framework that can apply to every business. While you can exclude small bits, the vast majority applies to everyone. TISAX is more scaled based on the level of security you're dealing with. Businesses can pick both different levels and different subject areas for their Label. Another key difference is that Labels can only be verified through the ENX portal, this is where other TISAX clients can see who has what Label, including the details of level and selected subject areas. Business can still chose to state TISAX compliance on their website, but the details regarding the level of compliance only need to be seen be relevant individuals. [22:05] What is the ENX portal and how does this help with supplier onboarding? The ENX portal is accessible through the ENX website. It does require a fee to make an account, but this is where everything related to TISAX is managed. This is where you will upload your scope and findings and it's where Labels are assigned and documented for suppliers to search for. There are options for how much information you want to disclose within those public searches, allowing you to select the need for contacting for further information. The ENX portal can help massively in reducing the amount of supplier questionnaires you need to fill in, as those looking for automotive suppliers will simply look up your TISAX Label to verify if you have the required level of security to continue with the procurement process. [24:50] Where should companies start if they want to earn a TISAX label? If you're just diving in, we recommend you do some research first to fully understand what you're expected to do to earn a Label and how much the process will cost. Next you'll need to define your scope, so look at what sites need to be included and identify relevant client requirements in relation to TISAX. This is to ensure you're going for the right Level and subject areas. Next evaluate your internal resource for the project and related budget. As mentioned, you will need to pay to register on the ENX portal and you need to consider Assessment costs and any additional support costs should you need consultancy services. You'll also need to assign individuals to manage the project, which will include completing the self-assessment, updating your policies, procedures and documentation to align with the requirements and possibly conduct training if required. This isn't a 2 week project, realistic timescales will vary, but generally if you're starting from scratch you're looking at 9-12 months. If you have ISO 27001 in place already this could be reduced to 6-8 months. As with anything Standard related, leadership commitment is a big factor as you'll need their help and support to ensure the projects success. If you need additional help, reach out to consultants such as Blackmores to help guide you through the process. [28:05] Upcoming TISAX Webinar – Join us on the 18th March 2026 at 2pm for a webinar where we'll dive into TISAX further and provide practical guidance on how to complete the VDA Self-Assessment. Attendees will also get access to some freebies. So don't delay, register your place here today. We'd love to hear your views and comments about the ISO Show, here's how: ● Share the ISO Show on Twitter or Linkedin ● Leave an honest review on iTunes or Soundcloud. Your ratings and reviews really help and we read each one. Subscribe to keep up-to-date with our latest episodes: Stitcher | Spotify | YouTube |iTunes | Soundcloud | Mailing List
"Crystal Ball Marketing," a strategy centered on the "Precursor Effect." This concept involves identifying specific indicators or life events that predict exactly when a marketplace is most likely to need and buy a specific service. By targeting customers at these pivotal moments, businesses can significantly increase conversion rates with less sales effort. Key Takeaways The Precursor Effect Defined: Identifying a life event, calendar event, or business shift that occurs immediately before a customer requires your services. The Marathon Analogy: If you sell cold water at the finish line of a marathon, you don't need a clever sales pitch because the "precursor" (running a marathon) has already created an intense, immediate need. Transference: A precursor strategy that works in one industry (like targeting new movers) can often be successfully applied to another unrelated industry. Case Study: The "Moving" Strategy Frank shares a success story from an inner circle member in the professional services industry who helps people in physical pain: The Precursor: Moving into a new home is a physically demanding experience that often leads to physical pain. The Strategy: The client obtained a list of 540 people who had recently moved and sent them a 1.5-page letter offering a free initial service. The Investment: Approximately $1,000 for the list and mailing. The Results: 8 new customers acquired immediately. $2,500 in immediate cash collected. Over $14,000 in projected lifetime customer value (LTV) within the first year. Industry Examples of Precursors Legal Industry: The implementation of GDPR served as a massive precursor for lawyers to sell updated privacy policies. Home Services: Moving into or out of a home is a primary indicator that a homeowner will need maintenance or repair services. Dentistry: Halloween acts as a precursor for cavity checks due to high sugar consumption. Weight Loss: Holidays like Thanksgiving and Christmas are precursors for weight loss services as people tend to gain weight and seek a "reset" afterward. Action Steps Brainstorm: Spend a few minutes writing down every possible situation or event in a person's life that would make them want your service. Identify: Determine how you can find or "broker" a list of people who have just experienced those specific precursors. Execute: Create a targeted offer for those individuals while the need is at its peak.
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1We're back with another episode of Fantasy Life with Ian Hartitz and in today's episode Ian is joined by fantasy football expert Dwain "The Rock" McFarland to break down everything you need to know about the running back position heading into NFL free agency.This offseason's running back free agent class is historically deep — and where these players end up will completely reshape fantasy football drafts for 2026.We break down every RB that matters this offseason, from the headliners to the names flying under the radar. For each player, we cover what they did in 2025, the landing spots that make sense, and what it all means for your fantasy team next season.In today's episode: Are the Chiefs the best landing spot for any free agent RB? Will Kenneth Walker find a new home? Is Breece Hall the BEST free agent RB? And will he move on from the Jets? We're breaking down all this and so much more! Learn more about your ad choices. Visit megaphone.fm/adchoices
Vládny audit bol politickým zadaním no preukázal veľmi dobré výsledky občianského sektora. Reputačné škody ale budú obrovské, pre Aktuality to povedal Juraj Rizman z organizácie Post Bellum. Štát a jeho inštitúcie by boli veľmi radi, keby miera pochybenia pri ich vlastných projektoch bola iba pol percenta, dodáva. Ustojí Tretí sektor vládnu šikanu a prečo Juraj Rizman zažaloval Luboša Blahu?Ústavný súd iba nedávno vystavil zásadnú stopku vládnemu zákonu o mimovládkach,. Po snahe onálepkovať Trestí sektor ako agentov cudzej moci, tak legislatívne zlyhal aj koaličný pokus spraviť z mimovládneho sektora výlučných lobistov. Napriek verdiktu ústavných sudcov však politická a administratívna vojna vládnej koalície voči tretiemu sektoru ani zďaleka nekončí. Napokon, svedčia o tom aj slová i činy premiéra Fica, ktorý sa svojim nepriateľským postojom k občianskej spoločnosti už dlhodobo nijako netají a svoju vládu už pri nástupe označil aj za koniec éry vlády mimovládok.Za pravdu mu mal dať aj vládny audit vybraných subjektov. Ten odhalil účtovné a finančné pochybenia vo viacerých renomovaných organizáciách, či už ide o Post Bellum alebo projekty spojené s disidentkou Martou Šimečkovou. Aké reálne výsledky teda tento audit v skutočnosti priniesol? Potvrdil vládnu propagandu cieliacu na občiansku spoločnosť a demaskoval zásadné finančné pochybenia Tretieho sektora alebo je to práve naopak?Preverovalo sa niečo cez 40 miliónov, nedostatky a pochybenia sa našli vo výške cez 230 tisíc, takže miera pochybenia je - i podľa samotného ministerstva financií, približne vo výške 0,5 percenta celkovej sumy. To je veľmi dobrý výsledok pre celý občiansky sektor a štátne inštitúcie by boli veľmi radi, keď by miera pochybenia pri ich vlastných projektoch bola iba pol percenta, tvrdí Juraj Rizman.Aktuálne - napriek auditu - však vláda nariadila ďalšie širokospektrálne kontroly mimovládnych organizácií a to aj v oblastiach ako je BOZP či GDPR. Dá sa teda už hovoriť o šikane občianskej spoločnosti a ustojí tretí sektor pokračujúcu šikanu vlády Roberta Fica? Vydržali sme Mečiara, vydržíme aj Fica. Zatiaľ všetci, ktorí sa snažili zakázať či obmedziť občiansku spoločnosť - či už to boli fašisti, komunisti alebo to bol V. Mečiar, tak vždy prehrali. Žiaľ, takto neustále plytváme potenciálom tých najaktívnejších ľudí tejto krajiny, hovorí Juraj Rizman. Vládna šikana podľa neho bude pokračovať a tretí sektor sa pokúsia rozdeliť metódou “cukru a biča”. Časť sektora si budú chcieť kúpiť a ostatných zastrašiť alebo aspoň odradiť, dodáva.Ráno Nahlas. Tentoraz s Jurajom Rizmanom z občianskeho združenia Post Bellum. Pekný deň a pokoj v duši praje Braňo Dobšinský
"It's not just about where your data lives - it's about who should, or shouldn't, have access to it."In this episode of Softcat's Explain IT podcast, host Helen Gidney, Head of Architecture at Softcat, is joined by Sabina Anja, Chief Technologist, VMware Cloud Foundation at Broadcom, and Gary Hawkins, Chief Technologist, Hybrid Platforms at Softcat, to demystify the complexities of Data Sovereignty.As organisations face increasing regulatory pressure and the rapid adoption of AI, understanding where your data lives - and who controls it - is critical. The discussion explores how governance, the Cloud Act, and GDPR are reshaping cloud strategies across Europe, driving a renewed interest in private cloud and sovereign cloud solutions.In this episode, Helen, Sabina and Gary discuss:• Defining Data Sovereignty: Why it is not just about location, but about jurisdiction, technical control, and operational access.• The Reality of Repatriation: Analysing the shift back to on-premise or Neo cloud environments to control data, without abandoning public cloud entirely.• Modern Infrastructure: How containers, Kubernetes, and AI demands are influencing infrastructure and data design.• The Power of Platforms: Meaningful insights on using VMware Cloud Foundation 9 (VCF9) to provide a unified control plane for policy-based data sovereignty.Thanks for listening to the Explain IT podcast from Softcat.This podcast is produced by The Podcast Coach. Hosted on Acast. See acast.com/privacy for more information.
Irish SMEs may be unknowingly breaching GDPR and failing to meet Workplace Relations Commission (WRC) record-keeping requirements due to widespread gaps in how HR documents are stored, accessed, and governed. That is, according to new findings published from the Irish SME HR Report, by Ireland's leading people management platform, HRLocker. The report, based on responses from professionals working on HR in organisations employing 20–249 people, reveals that document disorder has become one of the most significant, yet preventable, compliance risks facing Irish businesses. Two-thirds breach GDPR due to insecure HR data storage Under Articles 5 and 32 of the EU's General Data Protection Regulation (GDPR), employers must ensure the integrity, confidentiality, and security of employees' personal data. Yet 66 per cent of SMEs continue to store HR documents in insecure systems, including general cloud folders (32 per cent), local hard drives (11 per cent), paper files (11 per cent) and email threads (9 per cent). The Data Protection Commission has already investigated SMEs for similar failures. In a recently published case, an employer mishandled sensitive employment information during a data breach, prompting an official complaint and regulatory intervention. The DPC found that the organisation had not implemented adequate safeguards to protect employee data, providing a clear example of the real?world consequences of poor HR document governance. Under GDPR, failures of this kind can result in administrative fines of up to €10 million or 2 per cent of global turnover, as well as compensation claims from affected employees. More than half failing to comply with data protection regulations The report highlights that 59 per cent of SMEs lack accurate, formal version control, risking breaches of GDPR Article 5(1)(d), which requires organisations to maintain accurate and up?to?date employee records. Further, 56 per cent do not have a current retention policy for HR data, despite the GDPR storage limitation principle and obligations under the Data Protection Act 2018. Mid-sized SMEs (50–99 employees) are the least compliant, with over one-third (39 per cent) lacking any retention policy at all. Without version control or retention schedules, SMEs cannot demonstrate compliance during WRC inspections or GDPR investigations, leaving them exposed to enforcement action, compensation claims, and costly remediation work. More than one in three risks undermining accountability requirements There is a clear lack of auditability in the sector, with 26 per cent of SMEs reporting that they do not maintain an audit trail for HR document access and changes. A further 27 per cent are unsure whether one exists, meaning more than one in three lack robust processes. This lack and uncertainty place organisations at risk of breaching GDPR Articles 24 and 30, which require employers to demonstrate accountability and maintain clear records of processing activities. In the event of a data-access request, breach investigation, or WRC inspection, the absence of an audit trail can lead to immediate compliance failure. Non-compliance carries real financial and operational consequences Governance gaps fuelled by document disorder also undermine compliance with core Workplace Relations Commission (WRC) record-keeping obligations, including requirements to maintain accurate, accessible, and up-to-date records on: Working hours Annual leave and public holidays Contracts and terms of employment Payroll and remuneration Disciplinary and grievance procedures Under the Workplace Relations Act 2023, missing audit trails, outdated files, or scattered storage systems can result in fixed-payment notices of up to €2,000 per offence, in addition to compensation awards to employees and orders to rectify records at the employer's expense. These costs come on top of business disruption during follow-up inspections and reputational damage that undermines employee trust. A preven...
Vládny audit bol politickým zadaním no preukázal veľmi dobré výsledky občianského sektora. Reputačné škody ale budú obrovské, pre Aktuality to povedal Juraj Rizman z organizácie Post Bellum. Štát a jeho inštitúcie by boli veľmi radi, keby miera pochybenia pri ich vlastných projektoch bola iba pol percenta, dodáva. Ustojí Tretí sektor vládnu šikanu a prečo Juraj Rizman zažaloval Luboša Blahu?Ústavný súd iba nedávno vystavil zásadnú stopku vládnemu zákonu o mimovládkach,. Po snahe onálepkovať Trestí sektor ako agentov cudzej moci, tak legislatívne zlyhal aj koaličný pokus spraviť z mimovládneho sektora výlučných lobistov. Napriek verdiktu ústavných sudcov však politická a administratívna vojna vládnej koalície voči tretiemu sektoru ani zďaleka nekončí. Napokon, svedčia o tom aj slová i činy premiéra Fica, ktorý sa svojim nepriateľským postojom k občianskej spoločnosti už dlhodobo nijako netají a svoju vládu už pri nástupe označil aj za koniec éry vlády mimovládok.Za pravdu mu mal dať aj vládny audit vybraných subjektov. Ten odhalil účtovné a finančné pochybenia vo viacerých renomovaných organizáciách, či už ide o Post Bellum alebo projekty spojené s disidentkou Martou Šimečkovou. Aké reálne výsledky teda tento audit v skutočnosti priniesol? Potvrdil vládnu propagandu cieliacu na občiansku spoločnosť a demaskoval zásadné finančné pochybenia Tretieho sektora alebo je to práve naopak?Preverovalo sa niečo cez 40 miliónov, nedostatky a pochybenia sa našli vo výške cez 230 tisíc, takže miera pochybenia je - i podľa samotného ministerstva financií, približne vo výške 0,5 percenta celkovej sumy. To je veľmi dobrý výsledok pre celý občiansky sektor a štátne inštitúcie by boli veľmi radi, keď by miera pochybenia pri ich vlastných projektoch bola iba pol percenta, tvrdí Juraj Rizman.Aktuálne - napriek auditu - však vláda nariadila ďalšie širokospektrálne kontroly mimovládnych organizácií a to aj v oblastiach ako je BOZP či GDPR. Dá sa teda už hovoriť o šikane občianskej spoločnosti a ustojí tretí sektor pokračujúcu šikanu vlády Roberta Fica? Vydržali sme Mečiara, vydržíme aj Fica. Zatiaľ všetci, ktorí sa snažili zakázať či obmedziť občiansku spoločnosť - či už to boli fašisti, komunisti alebo to bol V. Mečiar, tak vždy prehrali. Žiaľ, takto neustále plytváme potenciálom tých najaktívnejších ľudí tejto krajiny, hovorí Juraj Rizman. Vládna šikana podľa neho bude pokračovať a tretí sektor sa pokúsia rozdeliť metódou “cukru a biča”. Časť sektora si budú chcieť kúpiť a ostatných zastrašiť alebo aspoň odradiť, dodáva.Ráno Nahlas. Tentoraz s Jurajom Rizmanom z občianskeho združenia Post Bellum. Pekný deň a pokoj v duši praje Braňo Dobšinský
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1UNTITLED with Kendall and Cooterdoodle is BACK for another season! These two fantasy football experts are here to give you all of the information you need to know this NFL offseason for fantasy football, all while having a bit of fun along the way!In today's epsiode: Did you hear that the Seahawks aren't going to franchise tag Kenneth Walker? Kendall is giving up ADP for lent?! Breaking down recently dropped NFL win totals Who is going to get franchise tagged? Kendall and Cooterdoodle are here to break it all down! Learn more about your ad choices. Visit megaphone.fm/adchoices
Today we are talking about Mautic, marketing automation, and its history with Drupal with guest Ruth Cheesley. We'll also cover Mautic ECA as our module of the week. For show notes visit: https://www.talkingDrupal.com/541 Topics What Is Mautic? Self-Hosting and Data Ownership Who Uses Mautic + Personalization Mautic's History with Drupal How Drupal Integrate Mautic Orchestration in Mautic Privacy & Compliance: GDPR Tools, Consent, and Do-Not-Contact Controls Hosting Options Advanced Segmentation Points-Based Lead Scoring Validating Segments Using Points to Boost Common Mautic Adoption Pitfalls Getting Support The Future with AI AI and Open Source Maintenance Mautic Sustainability & Fundraising How to Contribute Resources Mautic Mautic Integration Advanced Mautic Integration Talking Drupal #343 - Marketing Automation with Mautic Managed hosting, 40% goes to the community Mautic/Drupal case study and presentation on that from our conference https://www.youtube.com/watch?v=r0SkfeHTLK8 https://mautic.org/case-study/inagro/ GDPR cleanup jobs to remove old data Anonymization tasks to comply with specific laws (eg CCPA) Anonymize IP setting Proposal to overhaul all things privacy and streamline experience for marketers - currently seeking funding, planning to ship in Mautic 9 Mautic contribution docs Testing PRs: inlcuding local setup guide Low/no-code tasks board Thanks Dev Ecosystems Guests Ruth Cheesley - ruthcheesley.co.uk RCheesley Hosts Nic Laflin - nLighteneddevelopment.com nicxvan John Picozzi - epam.com johnpicozzi Catherine Tsiboukas - mindcraftgroup.com bletch MOTW Correspondent Martin Anderson-Clutz - mandclu.com mandclu Brief description: Have you ever wanted to integrate Mautic marketing automation into your Drupal website, using ECA? There's a module for that. Module name/project name: Mautic ECA Brief history How old: created in Jun 2025 by Abhisek Mazumdar (abhisekmazumdar) of Dropsolid Versions available: 1.0.6 which works with Drupal 10 and 11 Maintainership Actively maintained Documentation - detailed README Number of open issues: 1 open issues, which is not a bug Usage stats: 3 sites Module features and usage With the module installed, your ECA models can respond to Mautic webhooks, and can also make use of new actions to give you CRUD capabilities (Create, Read, Update, or Delete) for contacts and segments within ECA Mautic ECA declares the Mautic API module as a dependency, and you need to use it to set up an API connection, and to define any webhooks you want to use in your models It's worth noting that the maintainers of Mautic ECA also seem to be involved with a number of other modules in the Mautic API ecosystem, including Mautic Personalization, as well as Mautic Content Provider, which can expose Drupal content for use in Mautic, for example to include in emails
In questa puntata parliamo con Antonio Baldassarra, CEO di Seeweb, per entrare nel cuore operativo di un cloud provider. Dalla progettazione di un datacenter alla gestione dell'hardware, emergono dinamiche economiche, scelte tecniche e responsabilità imprenditoriali che raramente vengono raccontate. L'episodio offre uno sguardo concreto su cosa significa costruire e far evolvere l'infrastruttura cloud oggi.La riflessione si estende poi al ruolo che l'Europa può svolgere nello sviluppo di un'offerta cloud credibile e competitiva. Una discussione pragmatica, utile a chi prende decisioni tecnologiche con impatti strategici.
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee. https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1 We're back with another episode of Fantasy Life with Ian Hartitz and in today's episode Ian is joined by fantasy football and award-winning NFL mock drafter Matthew Freedman to break down the 2026 NFL Draft Class and, more specifically, the quarterbacks in this class. In today's episode: WHY is Fernando Mendoza the consensus QB1 of this class? Who actually is the QB2 after Mendoza? Could a surprise QB from North Dakota State make waves? We're talking all this and so much more! Learn more about your ad choices. Visit megaphone.fm/adchoices
AI is transforming the world—but is it transforming privacy for better or for risk? We trust our GP with our deepest secrets, but can we extend that same trust to AI-powered systems and cloud-based suppliers? And if AI can re-identify people even in anonymized research data, is “anonymous” still real anymore? In this episode, Punit Bhatia and Tania Palmariellodiviney reveals how AI tools reshape confidentiality, integrity, availability, cloud sprawl, supplier risk, clinical transcription accuracy, re-identification, and even personal fears like voice-based deepfakes. The voice of experience rings clear: digital trust isn't a checkbox…it's engineered early with transparency, responsible data use, privacy by design, and safety by design.
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1We're back with another episode of Fantasy Life with Ian Hartitz and in today's episode Ian is joined by fantasy football expert Dwain "The Rock" McFarland to break down everything you need to know about the quarterback position this NFL offseason.What are the sure fire moves that teams will make this offseason? Will Minnesota get competition for J.J. McCarthy? Where will guys like Kyler Murray and Tua Tagovailoa end up in the trade market? We're breaking down all this and so much more of the NFL offseason and how the QB position may shape up! Learn more about your ad choices. Visit megaphone.fm/adchoices
Most B2B companies struggle to turn marketing into measurable pipeline. At B2B Better, we build owned media systems that sales teams actually use to close deals, shortening cycles, improving reply rates, and directly influencing revenue. If you're tired of content that looks good on paper but doesn't move the business forward, visit the links in the show notes to learn how we do it differently. If your best clients won't sign case studies because legal says no, this episode shows you exactly how to flip that dynamic. Host Jason Bradwell shares how he cracked this problem working in broadcast media tech, where sports properties refused to give free logo rights to vendors they were already paying. Jason's core point: legal teams don't fear telling the story, they fear losing control over how it's told. Traditional case studies feel like monumental approval chains with multiple drafts and stakeholder reviews. It's easier to just say no. Jason worked for a tech company serving major sports media properties. The opportunity seemed obvious: tell stories about household name clients. But sports rights holders get paid millions for sponsorship rights. Why would they give a tech vendor free permission to use their name for marketing? Most teams try tactics that don't work: anonymous case studies nobody believes, paying for logo rights, using old logos without permission, or giving up entirely and competing on price. Here's what changed. When Jason's team sat down with legal teams, they learned it wasn't fear of the story—it was fear of losing control and bandwidth nightmares. So they launched a podcast with a different value exchange. Instead of "come talk about how great we are," the pitch was "come talk about your work and how you see the industry evolving." Questions submitted in advance. Full approval. Nothing goes live without sign-off. A VP of digital from a major sports league who'd said no to every promotional request for years agreed almost immediately. When Jason asked why, the answer was clear: "For years you've been asking me to do things for you. But this time you asked me to do something for me." The unlock is simple. Traditional case studies ask for public endorsement with high risk and zero personal upside. Editorial podcasts offer a platform to showcase expertise, professionally produced content they can use, and full control. The acceptance rate jumps from 5% for case studies to 70% for editorial podcasts. Sales can share clips without requiring testimonials, and the credibility is more authentic because it doesn't feel like marketing. Chapter Markers 00:00 - The legal blocker problem across every sector 01:00 - Working with sports media properties that wouldn't give logo rights 02:00 - Why GDPR and compliance make traditional case studies nearly impossible 03:00 - Four failed attempts most teams try 04:00 - What legal and compliance teams actually fear 05:00 - How podcasts flip the value exchange 06:00 - The breakthrough moment with the VP of digital 07:00 - Why "look how great they are" beats "look how great we are" 08:00 - Traditional case study vs editorial podcast value exchange 09:00 - The counterintuitive power of implied association 10:00 - The seven-step execution process 11:00 - Using content strategically in sales without testimonials 12:00 - Acceptance rates and ROI timeline 13:00 - Why this works even for clients who'd sign case studies 14:00 - The challenge: Email your top 10 blocked clients Useful Links Connect with Jason Bradwell on LinkedIn Check out The Tim Ferriss Show and The Twenty Minute VC Explore B2B Better website and the Pipe Dream podcast
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee.https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1We're throwing it back to Super Bowl week on Fantasy Life on Sirius XM Fantasy Sports Radio with fantasy football experts Kendall Valenzuela and Adam Ronis as they discuss some way-too-early running back rankings for the 2026 season.But we're not stopping there, Kendall and Adam also are giving their way too early "My Guys" for the 2026 fantasy football season. Who are they high on in early ADPs over at Underdog fantasy and who do they expect to rise and fall by the time the season comes around? Learn more about your ad choices. Visit megaphone.fm/adchoices
At ITEXPO / MSP EXPO, Zack Schwartz, Vice President of Strategic Partnerships at Trustifi, joined Doug Green to discuss a critical but often overlooked reality: while AI dominates headlines, email remains the primary attack vector for cybercrime. Trustifi delivers a full-suite email security platform purpose-built for MSPs, enabling easy deployment, centralized management, and advanced protection against next-generation AI-driven phishing attacks. Schwartz emphasized that over 91% of cyberattacks still originate from inbound email—and the sophistication of those attacks has grown dramatically with AI tools. “Cyber criminals are leveraging AI to create extremely nuanced attacks,” he explained. Trustifi addresses this by combining high-efficacy inbound phishing detection with innovative AI-driven training tools. One standout feature allows MSPs to convert a real phishing attack into customized security awareness training, generating targeted video content based on an incident that actually occurred within a customer's environment. A key differentiator is Trustifi's “journal-only mode,” which allows MSPs to deploy the platform without interrupting live email flow. The system produces a full report showing how Trustifi would have responded to threats, creating what Schwartz described as a powerful “aha moment” for customers. According to Trustifi, this approach converts over 80% of opportunities and requires only minutes to set up—at no cost to the partner or end client. Beyond inbound threats, Trustifi also addresses outbound risk and compliance requirements, including HIPAA, PCI, GDPR, and broader data loss prevention (DLP) concerns. Many organizations underestimate how much sensitive information leaves their network via email. “It's a big issue of not knowing what you don't know,” Schwartz said, highlighting how classification and encryption tools expose hidden vulnerabilities. With no minimum requirements, free NFR licenses for MSPs, and strong momentum away from legacy email gateways, Trustifi is positioning itself as a high-margin opportunity within the channel. The message to MSPs: start internally, see the exposure firsthand, and then extend protection across your customer base. Visit https://trustifi.com/
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee. https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1 Welcome back to THE Fantasy Life Show with Ian Hartitz! In today's episode, Ian is joined by the one and only Matthew Freedman to talk through some of the players who could be potential cap casualties this offseason and become free agents in the NFL in 2026. From the guys who definitely aren't getting cut, to the ones that we (selfishly) may want to see cut for our own fantasy purposes, we're breaking down all of the running backs, wide receivers, tight ends and quarterbacks who could be on the chopping block from some teams in order to make some room on their teams' bottom lines. In today's episode: - Tyreek Hill is FOR SURE going to get cut... right? - Could New Orleans target a new STUD RB1 in the draft? - Could Kirk Cousins fight for a starting job back in Minnesota? We're talking all this and so much more! ______________________ If you want more of Fantasy Life, check us out at FantasyLife.com, where all our analysis is free, smart, fun, and has won a bunch of awards. We have an awesome free seven-day-a-week fantasy newsletter (which would win awards if they existed, we assure you!): https://www.fantasylife.com/fantasy-newsletter-5 And if you want to go deeper, check out our suite of also-award-winning premium tools at FantasyLife.com/pricing But really we hope you just are enjoying what you clicked on here, and come back for more. We are here to help you win!! 00:00 - Intro 02:16 - Potential RB Cap Casualties 15:21 - Potential WR Cap Casualties 29:48 - Potential TE Cap Casualties 42:15 - Potential QB Cap Casualties Learn more about your ad choices. Visit megaphone.fm/adchoices
What does AI really mean in simple terms? What are the biggest security and privacy risks for companies—especially in healthcare? How can organizations manage these risks effectively and stay compliant with fast-changing AI regulations? And why should businesses and professionals consider getting certified in ISO 42001, the new international standard for AI management systems? In this episode, Punit Bhatia talks with Walter Haydock, an expert in AI security and compliance, about how companies can use ISO 42001 to manage AI responsibly. They discuss the real-world risks of AI, practical steps to reduce them, and why certification can help build trust, credibility, and resilience in an AI-powered world.
Listen now on Apple, Spotify, and YouTube.—Berkay is a UX researcher with over eight years of experience, mostly in e-commerce and banking, working across both B2B and B2C. He has a bachelor's and a master's degree in product design and design research. His focus is on turning research into actionable insights, improving research processes and helping teams make user-centered decisions. Basically, reducing uncertainty. He also co-founded UXR Playground, Turkey's leading UX platform, where he runs trainings, workshops and mentorship programs. In a past role, he built and led a ResearchOps team, creating systems to make research more efficient and scalable.In our conversation, we discuss:* The eight-step framework Berkay uses for smooth, ethical participant recruitment, built from actual interviews and field work.* Why many researchers are flying blind with recruitment and how junior researchers often end up as accidental call center reps.* The most common screw-ups in screener surveys and how to write questions that don't sabotage your study before it starts.* How Berkay built a participant panel inside a 30-million-user company without a budget, and with legal breathing down his neck.* Why most panels fall apart after setup, and what to actually prioritize if you want yours to last longer than three studies.Some takeaways:* Ethics aren't optional. If you're collecting personal data, you're responsible for what happens to it. Berkay shares how one company got sued after leaking participant emails. It's not a footnote, it's a risk. Build ethics and legal compliance into your process from day one, or you'll learn the hard way.* Most companies are bad at recruitment and fixing it takes more than tools. Berkay got so fed up with watching junior researchers waste hours cold-calling participants that he turned the whole thing into a research study. The findings? A total lack of structure, zero shared frameworks, and a ton of internal guesswork pretending to be process.* Bad screener surveys kill good research. Asking “Do you use this app?” is a great way to recruit liars. Berkay shares simple but smart ways to avoid bias in screeners like using multi-select questions, hiding the research topic, and adding duplicate questions to sniff out lazy responses.* Building a panel sounds smart until you have to maintain it. Setting up a panel is the easy part. The real challenge is keeping the data clean, staying GDPR-compliant, and making participants feel like they're still part of something. Regular outreach (like quarterly surveys) and strong ties to your data team are non-negotiable.* A good panel is a cross-team operation. Berkay didn't just build a landing page and hope for the best. He brought in product, customer support, PMs, and data science from the start. If you want a panel that works across research needs and methods, it has to be owned across the company too.Where to find Berkay:* LinkedInStop piecing it together. Start leading the work.The Everything UXR Bundle is for researchers who are tired of duct-taping free templates and second-guessing what good looks like.You get my complete set of toolkits, templates, and strategy guides. used by teams across Google, Spotify, , to run credible research, influence decisions, and actually grow in your role.It's built to save you time, raise your game, and make you the person people turn to—not around.→ Save 140+ hours a year with ready-to-use templates and frameworks→ Boost productivity by 40% with tools that cut admin and sharpen your focus→ Increase research adoption by 50% through clearer, faster, more strategic deliveryInterested in sponsoring the podcast?Interested in sponsoring or advertising on this podcast? I'm always looking to partner with brands and businesses that align with my audience. Book a call or email me at nikki@userresearchacademy.com to learn more about sponsorship opportunities!The views and opinions expressed by the guests on this podcast are their own and do not necessarily reflect the views, positions, or policies of the host, the podcast, or any affiliated organizations or sponsors. This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit www.userresearchstrategist.com/subscribe
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
From EU fines that never get paid to cyber warfare grounding missiles mid-battle, this week's episode uncovers the untold stories and real-world consequences shaping today's digital defenses. How is the EU's GDPR fine collection going. Western democracies are getting serious about offensive cybercrime. The powerful cyber component of the Midnight Hammer operation. Signs of psychological dependence upon OpenAI's GPT-4o chatbot. CISA orders government agencies to unplug end-of-support devices. How to keep Windows from annoying us after an upgrade. What is OpenClaw, how safe is it to use, what does it mean. Another listener uses AI to completely code an app. Coinbase suffers another insider breach. What can be done Show Notes - https://www.grc.com/sn/SN-1064-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zscaler.com/security hoxhunt.com/securitynow trustedtech.team/securitynowCSS guardsquare.com
None of Your Goddamn BusinessJohn Morgan Salomon said something during our conversation that I haven't stopped thinking about. We were discussing encryption, privacy laws, the usual terrain — and he cut through all of it with five words: "It's none of your goddamn business."Not elegant. Not diplomatic. But exactly right.John has spent 30 years in information security. He's Swiss, lives in Spain, advises governments and startups, and uses his real name on social media despite spending his career thinking about privacy. When someone like that tells you he's worried, you should probably pay attention.The immediate concern is something called "Chat Control" — a proposed EU law that would mandate access to encrypted communications on your phone. It's failed twice. It's now in its third iteration. The Danish Information Commissioner is pushing it. Germany and Poland are resisting. The European Parliament is next.The justification is familiar: child abuse materials, terrorism, drug trafficking. These are the straw man arguments that appear every time someone wants to break encryption. And John walked me through the pattern: tragedy strikes, laws pass in the emotional fervor, and those laws never go away. The Patriot Act. RIPA in the UK. The Clipper Chip the FBI tried to push in the 1990s. Same playbook, different decade.Here's the rhetorical trap: "Do you support terrorism? Do you support child abuse?" There's only one acceptable answer. And once you give it, you've already conceded the frame. You're now arguing about implementation rather than principle.But the principle matters. John calls it the panopticon — the Victorian-era prison design where all cells face inward toward a central guard tower. No walls. Total visibility. The transparent citizen. If you can see what everyone is doing, you can spot evil early. That's the theory.The reality is different. Once you build the infrastructure to monitor everyone, the question becomes: who decides what "evil" looks like? Child pornographers, sure. Terrorists, obviously. But what about LGBTQ individuals in countries where their existence is criminalized? John told me about visiting Chile in 2006, where his gay neighbor could only hold his partner's hand inside a hidden bar. That was a democracy. It was also a place where being yourself was punishable by prison.The targets expand. They always do. Catholics in 1960s America. Migrants today. Anyone who thinks differently from whoever holds power at any given moment. These laws don't just catch criminals — they set precedents. And precedents outlive the people who set them.John made another point that landed hard: the privacy we've already lost probably isn't coming back. Supermarket loyalty cards. Surveillance cameras. Social media profiles. Cookie consent dialogs we click through without reading. That version of privacy is dead. But there's another kind — the kind that prevents all that ambient data from being weaponized against you as an individual. The kind that stops your encrypted messages from becoming evidence of thought crimes. That privacy still exists. For now.Technology won't save us. John was clear about that. Neither will it destroy us. Technology is just an element in a much larger equation that includes human nature, greed, apathy, and the willingness of citizens to actually engage. He sent emails to 40 Spanish members of European Parliament about Chat Control. One responded.That's the real problem. Not the law. Not the technology. The apathy.Republic comes from "res publica" — the thing of the people. Benjamin Franklin supposedly said it best: "A republic, if you can keep it." Keeping it requires attention. Requires understanding what's at stake. Requires saying, when necessary: this is none of your goddamn business.Stay curious. Stay Human. Subscribe to the podcast. And if you have thoughts, drop them in the comments — I actually read them.Marco CiappelliSubscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.> https://www.linkedin.com/newsletters/7079849705156870144/Marco Ciappelli: https://www.marcociappelli.com/John Salomon Experienced, international information security leader. vCISO, board & startup advisor, strategist.https://www.linkedin.com/in/johnsalomon/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Fantasy football is unpredictable, but your internet price doesn't have to be. Lock in fast, reliable WiFi with Xfinity's 5-Year Price Guarantee. https://ad.doubleclick.net/ddm/trackclk/N8667.5415713FLNEWSLETTERLLC/B34798571.4365895[…]gdpr=${GDPR};gdpr_consent=${GDPR_CONSENT_755};ltd=;dc_tdv=1 Welcome back to THE Fantasy Life Show with Ian Hartitz! In today's episode, Ian is joined by the one and only Dwain "The Rock" McFarland to break down Super Bowl LX and where we can see both of these teams going in 2026 (and the ramifications of that for fantasy football)! From Kenneth Walkers (literal) MVP performance to Drake Maye's struggles continuing into the Super Bowl, Ian and Dwain are breaking down all sides of the game so that you can know exactly the takeaways needed for fantasy football in 2026 from both the Seahawks and Patriots! AND THEN! Ian and Dwain break down some of the top landing spots for Quarterbacks and running backs entering 2026 NFL free agency and what that could mean for fantasy football! - Could Minnesota be the preferred landing spot for free agent quarterbacks? - Is Kansas City by-far-and-away the best landing spot for free agent RBs? - What if the Bears moved on from D'Andre Swift?