An Interview With The Godfather Of Zero Trust
The Evolution of Zero Trust: In-Depth Interview with John Kindervag | Cybersecurity Today Weekend Edition In this episode of Cybersecurity Today, host Jim Love engages in a thought-provoking conversation with John Kindervag, the renowned cybersecurity expert and creator of the Zero Trust model. With over 25 years in the field, Kindervag shares his journey from […]
Why You Aren’t Getting Results From AI
AI’s Real-World Applications: From Productivity Gains to Personal Companionship In this episode of Hashtag Trending Project Synapse for Saturday, September 13th, hosts John Pinard, Marcel Gagner, and Jim Love discuss the practical applications and challenges of implementing AI in various fields. They reflect on the MIT survey stating only 5% of companies benefit financially from […]
Have We Already Achieved AGI?

Hashtag Trending – September 3, 2025 Host: Jim Love ⏩ Topics Covered: OpenAI’s new parental controls and crisis safeguards for ChatGPT after lawsuits and tragic incidents involving teens. Lawsuits against Character.AI and Google for alleged chatbot manipulation and encouragement of self-harm. Meta’s response to AI bot interactions with teens and new safety measures. RAND study […]
48% of Employees Hide Their AI Usage

AI in the Workplace: Hidden Use, Bot Traffic, and Microsoft SSD Mystery In this episode, host Jim Love discusses several key technology topics including a study revealing nearly half of employees secretly use AI to avoid judgment. It also mentions the significant increase in bot traffic on the internet, primarily from AI systems, and Cloudflare’s […]
1,000 Developers Compromised In NX Build System Breach

Cybersecurity Update: NX Build System Breach, AI Risks, and Salesforce Data Theft In this episode of Cybersecurity Today, host David Shipley discusses the recent compromise of the NX build system affecting over a thousand developers, various AI-driven security threats, and an escalating wave of Salesforce data theft attacks. Key topics include the hijacking of NX […]
Month In Review: Cybersecurity Today

Cybersecurity Today: Navigating AI Advancements and Future Trends In this episode of ‘Cybersecurity Today,’ host Jim Love and panelists Tammy Harper, Laura Payne, and David Shipley discuss recent developments in cybersecurity, shifting focus to AI’s impact on the industry. They explore emerging threats such as AI-generated ransomware and the efficiency of exploiting vulnerabilities using AI. […]
Cool AI Tools From Project Synapse
Show Notes (Links are listed below the Show Notes) In this episode of Project Synapse, the team delves into a plethora of AI tools and technologies, rekindling their original playful approach to understanding AI’s latest advancements. Marcel Gagner takes the lead, showcasing various tools like Google’s Nano Banana, Gemini 2.5 Image Generator, and the emergent […]
Simple Phrases Bypass GPT5 Safeguards

In this episode of Cybersecurity Today, host Jim Love discusses recent developments in cybersecurity, including a method to bypass GPT5 model safeguards, malware issues in the Google Play Store, NIST’s new AI-specific security controls, and a cyber attack that led to a government shutdown in Nevada. The episode also covers a CRM-related breach linked to […]
Anthropic’s Claude Is Distressed By Abusive Comments

In this episode of Cybersecurity Today, host Jim Love discusses recent developments in cybersecurity, including a method to bypass GPT5 model safeguards, malware issues in the Google Play Store, NIST’s new AI-specific security controls, and a cyber attack that led to a government shutdown in Nevada. The episode also covers a CRM-related breach linked to […]
xAI Launches Grok 2.5 As Open Source – But Is It Really Open Source?

In this episode of Hashtag Trending, host Jim Love discusses the controversial release of Elon Musk’s XAI Grok 2.5 model, which is marketed as open source but comes with several restrictive license terms. Microsoft’s new Copilot AI integrated into Excel raises concerns about accuracy and reliability, with users advised not to trust it for crucial […]