Remove events podcasts
article thumbnail

Zelle Is Using My Name and Voice without My Consent

Schneier on Security

Zelle has been using my name, and my voice, in audio podcast ads—without my permission. It’s possible that I gave some sort of blanket permission when speaking at an event. Okay, so this is weird. At least, I think it is without my permission. It’s not likely, but it is possible. I wrote to Zelle about it.

Marketing 250
article thumbnail

Podcast Episode 14: University of Richmond’s Winning Strategies of an All-Female CTF Squad

Security Boulevard

The post Podcast Episode 14: University of Richmond’s Winning Strategies of an All-Female CTF Squad appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App

Security Boulevard

The iPhone exploit, known as Operation Triangulation, has complex chains of events that lead to compromised iPhone security. Meanwhile, the lawsuit against Google claims […] The post Most Advanced iPhone Exploit Ever, Google’s $5 Billion Settlement, Apple’s Journal App appeared first on Shared Security Podcast.

article thumbnail

MVP 11

Troy Hunt

Join a podcast? All this time later and in a fundamentally different world to one all of us were in back then, I still find people unable to grasp why I and so many of my friends and peers would want to do what we do: "You mean you don't get paid to write a blog post? Speak at a user group? What madness is this?!"

Media 287
article thumbnail

Podcast Episode 10: New AI Safety Standards, Cyber Skills Gap, Experience VS. Certification

Security Boulevard

Get ready to dive into recent cybersecurity events and hot topics. The post Podcast Episode 10: New AI Safety Standards, Cyber Skills Gap, Experience VS. Certification appeared first on Security Boulevard. We dissect AI’s use across multiple industries, examining how it’s trained for specific tasks and discussing its limitations.

article thumbnail

Using LLMs to Automate and Streamline Cyber Threat Analysis

Security Boulevard

TechSpective Podcast Episode 122 There are a number of steps involved in cyber threat analysis to review event information and determine which events are benign or innocuous and which are malicious–or at least deserve greater scrutiny.

article thumbnail

Top Cybersecurity Podcasts

CyberSecurity Insiders

Listening to podcasts is a great way to stay up to date while you’re on the go, or even while you’re working. The (ISC)² team has gathered a collection of top cybersecurity podcasts that support our vision of inspiring a safe and secure cyber world. Top Cybersecurity Podcasts. 3-30 minutes l RSS, Google Podcasts, Apple Podcasts.