show episodes
 
Social Justice & Activism episodes of the popular The Creative Process podcast. We speak to activists, environmental organizations, indigenous groups, artists, writers & others who have devoted their life to making a difference. To listen to ALL arts, activism & environmental episodes of “The Creative Process · Arts, Culture & Society”, you’ll find our main podcast on Apple: tinyurl.com/thecreativepod, Spotify: tinyurl.com/thecreativespotify, or wherever you get your podcasts! Exploring the ...
  continue reading
 
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics.
  continue reading
 
Artwork

1
MacEnterprise Podcast

The MacEnterprise Podcast Team

Unsubscribe
Unsubscribe
Monthly
 
Do you support Macs in an enterprise computing environment? Our goal is to bring the experience of a conference session to you by featuring knowledgeable and experience Mac system administrators as guests. We cover everything from client management and software deployment to AD integration, server management and more!
  continue reading
 
Have you ever imagined listening to your favorite IT security expert discuss the ways you can enhance the security posture of your environment on-the go? Now you can! We're thrilled to announce the launch of our weekly podcast series where our security experts will present their take on a wide range of IT security topics.
  continue reading
 
Artwork
 
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
  continue reading
 
We are two Black women discussing health disparities that disproportionately affect the Black community. We examine current and historical cases of medical injustices within the American healthcare system. And we amplify organizations and individuals working with marginalized communities to improve health outcomes.
  continue reading
 
Artwork

1
IPv6 Buzz

Packet Pushers

Unsubscribe
Unsubscribe
Monthly+
 
IPv6 Buzz is for network engineers and infrastructure pros adopting IPv6 or who want to learn more about the protocol. Hosts Ed Horley, Tom Coffeen, and Scott Hogg demystify IPv6’s intricacies and deliver practical insights in a conversational style that explain the how and why of implementation. They’ve literally written the books about IPv6 and routinely consult on public, private, and federal deployments. IPv6 Buzz is an essential podcast for building your knowledge, confidence, and exper ...
  continue reading
 
The HIP Podcast is the premier podcast for cybersecurity pros charged with defending hybrid identity environments. Hosted by 15-time Microsoft MVP and Active Directory security expert, Sean Deuby. Presented by Semperis: the pioneers of identity-driven cyber resilience for the hybrid enterprise.
  continue reading
 
With thousands of organizations using Microsoft software solutions, One Identity and Microsoft have come together to make Zero Trust Active Directory Security within reach. Cybersecurity starts with identity management. For CISOs and other IT security leaders, this is at the forefront of their minds as they seek solutions to prevent breaches and enable Zero Trust. This podcast series focuses on how Microsoft and One Identity solutions work together to create a Zero Trust security model. Hear ...
  continue reading
 
Loading …
show series
 
What things Microsoft lurk in the shadows, basements, and dark closets of your I.T. organization? Which parts of Active Directory, Exchange, or M365 keep you up at night, racked with anxiety and fear? Is there no relief from scary upgrades and failures to be had? Fear not, loyal compatriots! Bust out your flashlights, proton packs, and ectoplasm-re…
  continue reading
 
Text us feedback! This is a recording of a webinar aimed at IT professionals, system administrators, and cybersecurity professionals eager to bolster their defenses against cyber threats. In this session, "How to Harden Active Directory to Prevent Cyber Attacks," our expert speakers will discuss comprehensive strategies and best practices for secur…
  continue reading
 
More application platform pieces make your life better! While at Build in Seattle, Richard sat down with Buu Lam of F5 to discuss F5's latest offering, NGINX as a Service in Azure. Buu discussed how F5's products have evolved to run in the cloud, not just on their hardware. While you could run them as virtual machines or containers, providing them …
  continue reading
 
In this episode on Speaking Out of Place podcast Professor David Palumbo-Liu and Azeezah Kanji talk with scholar Angana Chatterji and journalist Siddhartha Deb. For decades, they have exposed the violence and fascism lying behind the mythology of India as the world’s largest democracy. In the wake of India’s most recent elections, in which the far …
  continue reading
 
Imagine a world with no broadcast storms, basically no DAD issues, not even ARP and reverse ARP. That is the world of IPv6 neighbor discovery. In today’s episode, we teach you the simplicity of IPv6 neighbor discovery: just native Layer 3 addresses, ICMPv6, and multicast. If you’ve ever been annoyed at a guy hopping on... Read more »…
  continue reading
 
Text us feedback! In this episode, we discuss the latest trends and techniques for enumerating Microsoft 365. We break down how attackers may identify M365 tenants, how they discover and validate accounts and what you as an IT admin can do to protect your organization in-light of this. Topics covered: Credential Stuffing, Brute Force Attacks, Passw…
  continue reading
 
What are the hard parts of machine learning? Richard chats with Lynn Langit about her work helping the Mayo Clinic improve patient outcomes using machine learning to understand patient data better. Lynn talks about the challenges of multi-modal data analytics - taking all the different data collected from a patient, like an X-ray or video, along wi…
  continue reading
 
How can we show more kindness, respect, and love to the animals we share this planet with? What lessons can we learn from non-human animals about living in greater harmony with nature? Ingrid Newkirk is the Founder and President of PETA, actively leading the organization and advocating for animal rights. PETA is the largest animal rights organizati…
  continue reading
 
In this episode we discuss affirmative action and how its overturning has negatively impacted healthcare. And we highlight Dr. Uché Blackstock and her memoir Legacy: A Black Physician Reckons with Racism in Medicine*. Visit Dr. Blackstock’s website to learn more about her work and check out her book. And follow her on Instagram, Twitter, and Linked…
  continue reading
 
Text us feedback! In this episode, we discuss the latest trends and techniques for enumerating Microsoft 365. We break down how attackers may identify M365 tenants, how they discover and validate accounts and what you as an IT admin can do to protect your organization in-light of this. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cy…
  continue reading
 
Have you rolled out Microsoft Defender for Cloud? Richard chats with Yuri Diogenes about the bundle of tools under the Defender for Cloud moniker. Yuri describes Defender for Cloud as a Cloud-Native Application Protection Platform (CNAPP). This Gartner term covers the various elements that go into a cloud-native application, including APIs, servers…
  continue reading
 
If you don’t blame “destination unreachable” messages on DNS servers, are you even a real network engineer? All joking aside, Johannes Weber joins the show today to teach us how to use ICMPv6 to troubleshoot network issues, pinpointing if the problem is within your network or outside of it. He walks us through identifying possible... Read more »…
  continue reading
 
How can Microsoft Copilot make your intranet better? Richard chats with Susan Hanley about her experiences adding Copilot into the intranet via the Copilot Studio and Viva Engage. Susan talks about the challenges of getting your intranet data in order - most notably, archiving old information so that it doesn't clutter up a Copilot with out-of-date…
  continue reading
 
“We and all living beings thrive by being actors in the planet’s regeneration, a civilizational goal that should commence and never cease. We practiced degeneration as a species and it brought us to the threshold of an unimaginable crisis. To reverse global warming, we need to reverse global degeneration.” Can we really end the climate crisis in on…
  continue reading
 
Can we really end the climate crisis in one generation? What kind of bold collective action, technologies, and nature-based solutions would it take to do it? Paul Hawken is a renowned environmentalist, entrepreneur, author, and activist committed to sustainability and transforming the business-environment relationship. A leading voice in the enviro…
  continue reading
 
In this episode we interview Emilie Rodriguez and Guramrit LeBron, two doulas creating a better standard of care in maternal health for families of color through their organizations, Ashe Birthing Services and The Bridge Directory. And they discuss the importance of community and ancestral practices to provide the best support for birthing people. …
  continue reading
 
Welcome back for another new episode, Data Center Therapy aficionados! This week, our adventurous and hard-working hosts, Matt “Master Link” Yette and Matt “Chromed Crankset” Cozzolino open up the virtual studios to IVOXY’s own Ryan “Security Gusset” Grelck, who joins the fellas to talk all things endpoint-related for the first part of the podcast.…
  continue reading
 
Text us feedback! In this episode, Alex Boyd joins Spencer and Brad. Alex is a shareholder in Polsinelli's national Technology Transactions and Data Privacy practice, shares crucial insights for CTOs, IT Directors, CISOs, Security Managers when responding to security incidents. Discover common misconceptions about breaches and the mistakes organiza…
  continue reading
 
How are your company's Apple devices connected to the enterprise? Richard talks to Michael Epping about the recent additions in Entra that support the authentication of Apple MacOS and iPadOS devices. Michael discusses Apple's Secure Enclave as the equivalent of Trusted Platform Management in Windows. With Entra Platform SSO, you can now use that a…
  continue reading
 
“So, New York City will ultimately build a seawall that it estimates will cost somewhere in the order of 120 billion dollars. And, you know, the fact is that many cities in the United States will not be able to afford that, especially smaller ones and especially southern ones. A part of planning for this needs to include thinking about managed retr…
  continue reading
 
An estimated one in two people will experience degrading environmental conditions this century and will be faced with the difficult question of whether to leave their homes. Will you be among those who migrate in response to climate change? If so, where will you go? Abrahm Lustgarten is an investigative reporter, author, and filmmaker whose work fo…
  continue reading
 
If you’re an Active Directory administrator or part of an enterprise network team working with one, this episode is for you. Ed literally wrote the book “Practical IPv6 for Windows Administrators” so Scott has fun interviewing him as today’s guest. Ed goes over how to diagram out your IPv6 deployment, including address allocation and making... Read…
  continue reading
 
Text us feedback! In this episode, Brad and Spencer discuss the preparation stage of defending against ransomware. As we know, the time to have a plan is before you enter the woods and cybersecurity is no different. Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://twitter.com/cyberthreatpov Work with Us: …
  continue reading
 
“So for me, it just kind of removing a lot of the shame and then a lot of the energy that I was wasting trying to fit myself into a neurotypical process or framework or way of thinking or being. So, you know, some people call that unmasking, just kind of removing. I was wasting a lot of energy, basically trying to be someone else and function in a …
  continue reading
 
How can we learn to flourish because of who we are, not in spite of it? What is the sensory experience of the world for people with autism and ADHD? How can music help heal trauma and foster identity? Mattia Maurée is an interdisciplinary composer whose work centers around themes of perception, body, sensation, trauma, and resilience. Their scores …
  continue reading
 
Loading …

Quick Reference Guide