This is a podcast discussing the risks associated with facial recognition software, who is using it and how it is being used, and the steps we can take to ensure an individual's privacy and security
Finn
ethanwarner
Fleet Device Management
Hackerslist.co review
Cisco Systems
University of Bristol and the CyberWire
Security Sales & Integration
The Purple Book Community
None
Checkmarx
Conor Gilsenan
Security Compass
Matias Madou
The Security Ledger
Secure Digital
IDG
Design Gold
Tromzo
CarlosLaporte
The Security Ledger
Drata
Beyond Identity
IDG
Jemurai
DevSecCon, Snyk Ltd, Guy Podjarny
Alex Amiryan
Steven Bowcut
Derrick Conley
Paul F. Roberts
Cyolo
Tom Garrison and Camille Morhardt
Cybersecurity Growth
SYNDES®
Rafal Los (Wh1t3Rabbit)
Akeyless - The Secrets Management Company
Rafal Los (Wh1t3Rabbit)
Obscure Technologies
Zanidd
Phishing Archives - Black Hills Information Security
PSA Certified
Jon McLachlan
Security Weekly
Paul F. Roberts
Greg Mooney
Drew Koenig
Infoblox
Colin Bell, Rob Cuddy & Kris Duer
Conor Sherman
Indusface
None
Princeton University School of Engineering and Applied Science
paul@securityweekly.com
peter
SAM Secure Network
Joe Colantonio
cscp
Mrs Jennings
Evgeniy Kharam & Dmitry Raidman
Andrew Gilman
Maintel
Tresorit
Gary McGraw
Chris Romeo and Robert Hurlbut
Andrew Morgan
RevCult
Soluble
Nathan Pearce
NORAZIAH ABU BAKAR
Hannah Boothe, Dima Kotik, and Michael Burch
secureninja.com
Telenor Digital Podcast
Infosecurity Europe
None
Proact
Roan
CISO Series
EM360
Acreto Security
SECURITY – rule 11 reader
From AVANT ANALYTICS
securitycurrent
The Dark Tangent
The Dark Tangent
Device Authority
Device Authority
Gregory Burns
Tobin Solutions
Andy Anderson & CSD Staff
Mike Mimoso, Chris Brook
None
Brent Brackin & Cornel Du Preez
Security Weekly
AppSec MC
Cisco EMEAR Small Business Podcast
Jay Leask and Craig Jahnke
Josh
The Dark Tangent
The Dark Tangent
DEF CON