To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. In this special edition podcast, N2K CyberWire's ...
In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by security researchers Caitlin Hopkins, Diana Duvieilh, and Anna Seitz to discuss the latest trends in ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. The Biden administration is finalizing an ...
A form of authentication in which a user is granted access only after providing two or more distinct credentials. The first form of authentication is often a password, the other fomrs might be ...
In this episode, Perry & Mason talk about the challenges of watermarking AI content, trends in AI music generation (and how Spotify is capitalizing on them), OpenAI's new Genesis physics engine, and ...
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. On Hacking Humans, Dave Bittner, Joe Carrigan, ...
In this episode of Threat Vector, host David Moulton speaks with Margaret Kelley, a seasoned Digital Forensics and Incident Response Senior Consultant at Palo Alto Networks’ Unit 42. With a deep ...
A set of related requirements signifying specific product behaviors, as mandated by business or organizational need.
Code and data repositories that don't protect against unauthorized changes. "OWASP software and data integrity failures" on the Word Notes podcast.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today.
Andrew Hammond, Ph.D. is Historian & Curator at the International Spy Museum, home of the world's preeminent collection of intelligence-related artifacts. Previous chapters have included seven years ...
In this episode of The BlueHat Podcast, hosts Nic Fillingham and Wendy Zenone welcome back George Hughey and Rohit Mothe from the Microsoft Security Response Center (MSRC) to discuss their latest blog ...