show episodes
 
Artwork
 
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

Unsubscribe
Unsubscribe
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
HowTo Linux HD

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
EndAbortion Podcasts are part of a global multi platform initiative to End Abortion. The Podcasts are here to help energize and educate you on spreading the pro-life message and providing the tools necessary to end abortion.
  continue reading
 
Artwork

1
MSP 1337

Chris Johnson

Unsubscribe
Unsubscribe
Weekly
 
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference. Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support
  continue reading
 
Cloud Commute is your weekly 25-30 minutes podcast, talking about all things cloud, technology, storage, security, Kubernetes, and more. Joined by veteran guests from the industry, host Chris Engelbert explores new tools, ecosystem developments and upcoming releases. If you’re a tech enthusiast, working in DevOps, SecOps, DevSecOps, or engineering, this is the podcast for you. Make your commute worthwhile and join us on the journey of technology.
  continue reading
 
Spot's new podcast, “More Than a Broker,” is hosted by Spot Co-founder, Andrew Elsener. This podcast features interviews with industry experts and explores the latest trends and challenges in the freight transportation industry.
  continue reading
 
Artwork
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
  continue reading
 
Artwork

1
Network Security

University of Twente

Unsubscribe
Unsubscribe
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork

1
fivestones church

fivestones church

Unsubscribe
Unsubscribe
Monthly+
 
fivestones is a Pentecostal church located in Canton, Georgia. Whether you're hungry or hurt, lonely or lost, full of questions or looking for a home, there's a place for you @fivestonesga! Connect with us! www.fivestonesga.com
  continue reading
 
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
  continue reading
 
Somewhere on Earth: The Global Tech Podcast is a weekly podcast that looks at technology and how it impacts our daily lives. We tell the untold tech stories from Somewhere on Earth. We don’t do new toys and gadgets, but look at new trends, new tech and new ways we use that tech in our everyday lives. We discuss how the ever evolving digital world is changing our culture and our societies, but we don’t shy away from the news of the day, looking at the tech behind the top stories affecting our ...
  continue reading
 
Artwork

1
DIAF

Adequate.com

Unsubscribe
Unsubscribe
Monthly
 
DIAF is a series of audiobooks presented in podcast format which follow the adventures of Brian Brushwood and Justin Robert Young.
  continue reading
 
Welcome to These Are The Voyages: A Star Trek Podcast. This is your invitation to beam aboard and join us as we have fun together talking Trek. On the 7s of the month join us as we talk about an episode, book, a character, or anything that piques our interest. Grab your tricorder, communicator, and let‘s Boldly Go and Make It So.
  continue reading
 
Loading …
show series
 
Could abortion rights ever be rolled back in a blue state like New York? After Democrats lost a bunch of House seats in the last cycle, says Sasha Ahuja, the campaign director for New Yorkers for Equal Rights, that no longer seems so far-fetched. She talks to Bradley about Prop 1, a ballot initiative to enshrine reproductive freedom in the New York…
  continue reading
 
In this collaborative episode of Cyber Coffee Hour and The Other Side of the Firewall, hosts Dr. Joseph J. Burt Miller Jr., Ryan Williams Sr., Alfredo B. Nash Jr., Shannon Tynes, and Daniel Acevedo discuss the recent acquisition of Recorded Future by Mastercard. They explore the significance of this acquisition in enhancing Mastercard's cybersecuri…
  continue reading
 
Today on Packet Protector we look at cloud firewall architectures. If you’ve deployed firewalls in the campus or a data center, it’s useful to know that there are differences in the public cloud. We’ll dive into what you need to know, including deployment options, the role of high availability in public cloud, selecting the right... Read more »…
  continue reading
 
Vocational Boundaries – To some people, WORK is a 4-letter word. To others, it’s the most important thing in their lives, and even defines them as a person. Over and over in the book of Proverbs, we’re reminded that work does have tremendous value. The Bible even suggests that work can be an act of worship. We’ll unpack that today. Hear our earlier…
  continue reading
 
You may be vaguely aware of the term ‘quantum computing’ from media reports. But what you may not have picked up on is that one of the primary uses for quantum computers may be to break data encryption. Furthermore, you may not realize that if three-letter agencies can save off our encrypted emails and messages now, this could mean they could read …
  continue reading
 
On today’s Heavy Networking, we discuss enterprise browsers with sponsor Palo Alto Networks. Most end users do the majority of their work in the browser these days. At the same time, more threats are coming in via the Web and Web-based apps. Palo Alto Networks recently launched its Prisma Access browser, a Chromium-based browser designed... Read mo…
  continue reading
 
On today’s Heavy Networking, we discuss enterprise browsers with sponsor Palo Alto Networks. Most end users do the majority of their work in the browser these days. At the same time, more threats are coming in via the Web and Web-based apps. Palo Alto Networks recently launched its Prisma Access browser, a Chromium-based browser designed... Read mo…
  continue reading
 
Do you know what DevOps is? Really? And how well does it fit traditional NetOps? Host Scott Robohn and guest Tom McGonagle explore ways to apply DevOps to Network Engineering and Operations. They review the seven DevOps practices and Tom’s proposed adaptations of DevOps under the banner of GitNops. This is the first part of... Read more »…
  continue reading
 
Do you know what DevOps is? Really? And how well does it fit traditional NetOps? Host Scott Robohn and guest Tom McGonagle explore ways to apply DevOps to Network Engineering and Operations. They review the seven DevOps practices and Tom’s proposed adaptations of DevOps under the banner of GitNops. This is the first part of... Read more »…
  continue reading
 
Send us a text The ongoing theme in industrial cybersecurity centers on two competing dynamics – the desire to expand our implementation of automation and Industry 4.0 technologies with the goal of using more and faster connections, along with the decision-making data each generates to improve the efficiency and quality of production. However, thes…
  continue reading
 
In this episode of Cloud Commute, Michael Schmidt, co-founder & CTO of simplyblock, joins us to discuss the innovation behind simplyblock. Michael shares his journey from consulting and leading major retail IT operations to the creation of simplyblock. In this episode of Cloud Commute, Chris and Michael discuss: What is software-defined storage? Wh…
  continue reading
 
Fake GitHub Notices; More Iventi CVS Vulns; Deanonymizing Tor; iPhone Unlockers; Fake GitHub Site Targeting Developers https://isc.sans.edu/diary/Fake%20GitHub%20Site%20Targeting%20Developers/31282 Ivanti CSA 4.6 Advisory https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963?language=en_US Germa…
  continue reading
 
IPv6 Buzz welcomes back Nick Buraglio, a frequent guest, to discuss RFC 9637. We get into the details of RFC 9637, which describes the new documentation prefix space for IPv6. We also explore the process of how RFCs go from idea to standard in the IETF. (Cue the “I’m Just a Bill” song from Schoolhouse... Read more »…
  continue reading
 
Loading …

Quick Reference Guide