The intersection between data privacy and GRC, beyond “protection of data”

26:27
Unlock the Secrets of Data Privacy Interviews - You Won't Believe What They Ask!

52:19
CTEM - Continuous Threat Exposure Management with Ami Hofman

23:47
The Rust vs C Linux Divide.. Another Rust Maintainer Steps Down.

1:24:53
Unlocking the Draft Digital Personal Data Protection Rules 2025

17:34
How your employer sniffs you, or Deep Packet Inspection.

24:52
The Most Useful Thing AI Has Ever Done

21:34
The Final Barrier to (Nearly) Infinite Energy

46:24