logo
episode-header-image
Feb 2021
40m 57s

The War with Algorithms: Why Your Next S...

MISSION
About this episode
Nicole Eagan, Chief A.I. Officer at Darktrace, discusses the latest in A.I. cybersecurity technologies and how bad actors are gaining access to your most precious assets. IT Visionaries is brought to you by the Salesforce Platform - the #1 cloud platform for digital transformation of every experience. 
Up next
Nov 20
How to Maximize ROI on AI in 2026
<p>The promise of agentic AI has been massive, autonomous systems that act, reason, and make business decisions, but most enterprises are still struggling to see results.</p><p>In this episode, host Chris Brandt sits down with Sumeet Arora, Chief Product Officer at Teradata, to u ... Show More
59m 51s
Nov 6
90% of AI Demos Fail. Here’s How to Build One that Won’t
<p>If you’ve ever shipped an AI feature that looked great in testing — only to watch it behave unpredictably in production — you’re not alone.</p><p>In this episode of IT Visionaries, host Chris Brandt talks with Lawrence Jones, Founding Engineer at incident.io, about the critica ... Show More
59m 22s
Oct 31
The Future of Procurement: Real-Time Supply Chain Intelligence
<p>Every product a company ships depends on thousands of tiny decisions happening deep inside the supply chain. But most organizations are still making those decisions using stale spreadsheets, fragmented systems, and guesswork.</p><p>In this episode, we explore how AI-driven pro ... Show More
53m 20s
Recommended Episodes
May 2024
2889: Inside the World of Hacktivist DDoS Attacks with NETSCOUT's Richard Hummel
<p><span data-preserver-spaces="true">In this Tech Talks Daily Podcast episode</span><span data-preserver-spaces="true">, I sit down with Richard Hummel from NETSCOUT to delve into the ever-evolving DDoS threat landscape.</span><span data-preserver-spaces="true"> Why has there be ... Show More
33m 33s
May 2024
AI Is a Cybersecurity Tool and Threat
<p dir="ltr">When it comes to cybersecurity, artificial intelligence is proving to be both a formidable defensive tool and a potential threat. </p> <p><strong> </strong></p> <p dir="ltr">Today, Patrick Hevesi, VP Analyst with Gartner for Technical Professionals, discusses the con ... Show More
26m 19s
Sep 2019
Preventing Cyber Attacks with John Davis, Federal Chief Security Officer of Palo Alto Networks
From Senior Military Cyber Advisor at the Pentagon to VP and Federal Chief Security Officer at Palo Alto Networks, John Davis is an experienced cyber security professional focused on educating the public on cyber threats and preventing the next national and international cyber at ... Show More
52m 50s
Jan 2023
Criminal-on-criminal action in the dark web. The cyber phases of the hybrid war heat up. ICS vulnerabilities. Codespaces and malware servers. Blank-image attacks. Social engineering.
A hostile takeover of the Solaris contraband market. Ukraine warns that Russian cyberattacks continue. An overview of 2H 2022 ICS vulnerabilities. Codespaces accounts can act as malware servers. Blank-image attacks. Campaigns leveraging HR policy themes. Dinah Davis from Arctic W ... Show More
28m 12s
Sep 2023
Agent Tesla still hits unpatched systems. Hot wallet hacks. AI and DevSecOps. Notes on Fancy Bear and NoName057(16). And some curious trends in the cyber labor market.
There’s a new Agent Tesla variant. Lost credentials and crypto wallet hacks. Tension between DevSecOps and AI. Fancy Bear makes an attempt on Ukrainian energy infrastructure. A look at NoName057(16). Tim Starks from the Washington Post's Cybersecurity 202. Simone Petrella and Hel ... Show More
31m 23s
Jan 2023
The power of web data in cybersecurity. [CyberWire-X]
The public web data domain is a fancy way to say that there is a lot of information sitting on websites around the world that is freely available to anybody who has the initiative to collect it and use it for some purpose. When you do that collection, intelligence groups typicall ... Show More
27m 57s
Nov 2023
Cybercriminals at the service of the state, and an array of new underworld tools.
Data brokers offer information on active US military personnel. Current BlueNoroff activity. A new Gootloader variant is active in the wild. Atlassian vulnerabilities actively exploited. The prevalence of breaches. Update on a Barracuda vulnerability. Hacktivism and the cyber cou ... Show More
28m 16s
Oct 2017
No insight yet into Las Vegas gunman's motive as ISIS inspiration generally discounted. Yahoo! breach affected 3, not 1, billion user accounts. Equifax updates.
In today's podcast, we hear that ISIS claims of responsibility for Las Vegas murders continue to lose plausibility, but the shooter's motives remain a mystery. Yahoo!'s epic breach just got even more epic. Equifax looks little better in the wake of its CEO's Congressional testimo ... Show More
18m 3s