Home
Categories
EXPLORE
True Crime
Comedy
Society & Culture
Business
Sports
Technology
Health & Fitness
About Us
Contact Us
Copyright
© 2024 PodJoint
Podjoint Logo
US
00:00 / 00:00
Sign in

or

Don't have an account?
Sign up
Forgot password
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/57/5f/ea/575fea45-688f-ef52-0ca9-9e18c8c745c9/mza_8404287525769323427.jpg/600x600bb.jpg
Defending The Edge
DefendEdge
44 episodes
2 weeks ago
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.
Show more...
Tech News
Technology,
News
RSS
All content for Defending The Edge is the property of DefendEdge and is served directly from their servers with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.
Show more...
Tech News
Technology,
News
https://is1-ssl.mzstatic.com/image/thumb/Podcasts221/v4/57/5f/ea/575fea45-688f-ef52-0ca9-9e18c8c745c9/mza_8404287525769323427.jpg/600x600bb.jpg
38. Data Dumps and Miscommunication
Defending The Edge
26 minutes
4 months ago
38. Data Dumps and Miscommunication
In this episode of the Defending The Edge Podcast with DefendEdge, we discuss the recent cyber attacks from ConnestWise to Google Calendar. In a recent update, CISA has updated the way of reporting, and the intelligence community is aiming to create a shared threat actor glossary. Deepfake technology is becoming increasingly advanced and alarming. Lastly, Anonymous has been in the headlines for various data dumps. Join us as we discuss all of these topics and more.
Defending The Edge
In this episode of Defending the Edge, we cover breaches to breakthroughs, unpacking the Great Firewall of China data leak, the looming consequences of the CISA Act’s lapse, the rise of the “Shai-Hulud” worm, bold cybersecurity predictions, and the arrival of Sora 2, the AI platform reshaping the digital frontier.