Splunk Report Shows Observability is a Business Catalyst for AI Adoption, Customer Experience, and Product Innovation (Splunk ...
Dave Bittner is a security podcast host and one of the founders at CyberWire. He's a creator, producer, videographer, actor, experimenter, and entrepreneur. He's had a long career in the worlds of ...
The CyberWire podcasts are our look at what’s happening in cyberspace. They provide clear and concise summaries of the news and offer commentary from industry experts as well as our partners.
Most marketers learn executive communication the hard way. Rob Sobers, CMO at Varonis, joins Gianna and Charles to share what he’s figured out along the way, how to lead with the answer, give data ...
The CyberWire is an independent voice delivering concise, accessible, and relevant cybersecurity news briefings and cybersecurity podcasts to people all across the globe.
A defensive cyber operation carried out by US Cyber Command’s Cyber National Mission Force (CNMF) at the request of an allied nation. "hunt forward operation" on the Word Notes podcast.
To get access to ad-free episodes, exclusive podcasts, unlimited briefings, stories, and transcripts, and other valuable bonus features sign up today. A Texas telecom confirms a nation-state attack. A ...
International law enforcement take down the Breachforums domains. Researchers link exploitation campaigns targeting Cisco, Palo Alto Networks, and Fortinet. Juniper Networks patches over 200 ...
On this week's episode of The FAIK Files: Google begins rolling out Gemini 3.0 and other AI updates; We look at new studies showing where AI gets it wrong, from misrepresenting news to writing ...
Terms often used in cybersecurity discussions and education, briefly defined. Your corrections, suggestions, and recommendations for additional entries are welcome: email the editor at [email protected].
Frank X. Shaw⁠, Chief Communications Officer at Microsoft, joins Ann on this week's episode of Afternoon Cyber Tea to explore the critical role of communication in cybersecurity. They discuss how ...
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems.