This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Records live every Friday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Records live every Friday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
Hey NC! Join Shannon and Phil hosting NC politicians, artists, community activists and friends for an hour of free form discussions, from best biscuits to best record to how we can get things done together!
Live music from the premiere jazz club in New York City, from WBGO.
T
This Week in Enterprise Tech (Video)


1
TWiET 426: Legal Disco - eBook class-action against Amazon, tech visionary Sheldon Adelson, reducing the paper chase in your law office
1:03:09
1:03:09
Play later
Play later
Lists
Like
Liked
1:03:09
eBook customers file a class-action lawsuit against Amazon for anti-competitive pricing agreements Successful malware incidents rise China tosses more obstacles at WHO team investigating Covid-19 origins IBM acquiring, left and right, to get back into the customized cloud industry NSA recommends only 'designated' DNS resolvers Qualcomm to acquire N…
T
This Week in Enterprise Tech (Audio)


1
TWiET 426: Legal Disco - eBook class-action against Amazon, tech visionary Sheldon Adelson, reducing the paper chase in your law office
1:03:09
1:03:09
Play later
Play later
Lists
Like
Liked
1:03:09
eBook customers file a class-action lawsuit against Amazon for anti-competitive pricing agreements Successful malware incidents rise China tosses more obstacles at WHO team investigating Covid-19 origins IBM acquiring, left and right, to get back into the customized cloud industry NSA recommends only 'designated' DNS resolvers Qualcomm to acquire N…
T
This Week in Enterprise Tech (Video)


1
TWiET 425: What is Event Driven Modeling? - Starlink internet speeds, cyberattacks on healthcare, event modeling
1:14:30
1:14:30
Play later
Play later
Lists
Like
Liked
1:14:30
Internet Speeds From SpaceX's Starlink Cyberattacks on healthcare organizations during a pandemic The first rechargeable zinc-air battery Docker and AWS credentials are getting stolen by a crypto mining botnet Nissan Source Code Leaked Two CentOS Replacements Google Titan 2FA keys can be cloned Dry Ice is the key to getting America vaccinated Russi…
T
This Week in Enterprise Tech (Audio)


1
TWiET 425: What is Event Driven Modeling? - Starlink internet speeds, cyberattacks on healthcare, event modeling
1:14:31
1:14:31
Play later
Play later
Lists
Like
Liked
1:14:31
Internet Speeds From SpaceX's Starlink Cyberattacks on healthcare organizations during a pandemic The first rechargeable zinc-air battery Docker and AWS credentials are getting stolen by a crypto mining botnet Nissan Source Code Leaked Two CentOS Replacements Google Titan 2FA keys can be cloned Dry Ice is the key to getting America vaccinated Russi…
T
This Week in Enterprise Tech (Video)


1
TWiET 424: The Best of 2020 - A Look Back at 2020's Top Enterprise Stories
1:13:46
1:13:46
Play later
Play later
Lists
Like
Liked
1:13:46
2020 and the pandemic brought a lot of change to how businesses operate and brought to light many security issues. Lou Maresca, Brian Chee, Curt Franklin, Heather Williams, and Brian McHenry look back at the stories and discussions that defined 2020 for the enterprise. Hosts: Louis Maresca, Brian Chee, Curt Franklin, Brian McHenry, and Heather "Mo"…
T
This Week in Enterprise Tech (Audio)


1
TWiET 424: The Best of 2020 - A Look Back at 2020's Top Enterprise Stories
1:13:46
1:13:46
Play later
Play later
Lists
Like
Liked
1:13:46
2020 and the pandemic brought a lot of change to how businesses operate and brought to light many security issues. Lou Maresca, Brian Chee, Curt Franklin, Heather Williams, and Brian McHenry look back at the stories and discussions that defined 2020 for the enterprise. Hosts: Louis Maresca, Brian Chee, Curt Franklin, Brian McHenry, and Heather "Mo"…
T
This Week in Enterprise Tech (Audio)


1
TWiET 423: Reading Between the Lines - Post pandemic changes with Ridge Ventures
1:14:33
1:14:33
Play later
Play later
Lists
Like
Liked
1:14:33
Look out for malware in Chrome, Firefox, Edge and Yandex browsers Red Hat "shifts focus from CentOS Linux" Hackers bypass multi factor authentication 17,447 vulnerabilities in 2020 according to US-CERT Google kills Android Things Scientists have achieved Quantum Teleportation SolarWinds, the most dangerous company you never heard of Yousuf Khan, pa…
T
This Week in Enterprise Tech (Video)


1
TWiET 423: Reading Between the Lines - Post pandemic changes with Ridge Ventures
1:14:33
1:14:33
Play later
Play later
Lists
Like
Liked
1:14:33
Look out for malware in Chrome, Firefox, Edge and Yandex browsers Red Hat "shifts focus from CentOS Linux" Hackers bypass multi factor authentication 17,447 vulnerabilities in 2020 according to US-CERT Google kills Android Things Scientists have achieved Quantum Teleportation SolarWinds, the most dangerous company you never heard of Yousuf Khan, pa…
T
This Week in Enterprise Tech (Audio)


1
TWiET 422: Is Remote Access Growing Up? - FireEye Breach, Woz's new company, how hybrid cloud changes remote access
1:10:43
1:10:43
Play later
Play later
Lists
Like
Liked
1:10:43
New Win 10 malware can evade detection What we know so far about the FireEye breach GE's radiology device passwords leave hospital networks exposed Steve Wozniak's new business: Efforce Lightspin, a new cloud security startup Facebook ids Vietnamese IT firm as linked to malware on Anroid app store Are Mac certificate checks a privacy issue? Oblivio…
T
This Week in Enterprise Tech (Video)


1
TWiET 422: Is Remote Access Growing Up? - FireEye Breach, Woz's new company, how hybrid cloud changes remote access
1:10:43
1:10:43
Play later
Play later
Lists
Like
Liked
1:10:43
New Win 10 malware can evade detection What we know so far about the FireEye breach GE's radiology device passwords leave hospital networks exposed Steve Wozniak's new business: Efforce Lightspin, a new cloud security startup Facebook ids Vietnamese IT firm as linked to malware on Anroid app store Are Mac certificate checks a privacy issue? Oblivio…
T
This Week in Enterprise Tech (Audio)


1
TWiET 421: Eye Tracking Codpieces - SalesForce Workforce Engagement, Eye tracking with Tobii
1:06:19
1:06:19
Play later
Play later
Lists
Like
Liked
1:06:19
njRAT malware infects JavaScript and Node.js devs installing npm packages COVID-19 vaccine supply chain targeted by spear phishing campaign GaN improves data center efficiency Patriot Act used to gather website visitor logs Machine learning security bypassed by researchers Salesforce announces Workforce Engagement tools Facebook may have broken the…
T
This Week in Enterprise Tech (Video)


1
TWiET 421: Eye Tracking Codpieces - SalesForce Workforce Engagement, Eye tracking with Tobii
1:06:18
1:06:18
Play later
Play later
Lists
Like
Liked
1:06:18
njRAT malware infects JavaScript and Node.js devs installing npm packages COVID-19 vaccine supply chain targeted by spear phishing campaign GaN improves data center efficiency Patriot Act used to gather website visitor logs Machine learning security bypassed by researchers Salesforce announces Workforce Engagement tools Facebook may have broken the…
T
This Week in Enterprise Tech (Audio)


1
TWiET 420: Robotic Process Automation - Zoom's new security tools, should we still rely on G.P.S.?
1:10:48
1:10:48
Play later
Play later
Lists
Like
Liked
1:10:48
Python creator Guido van Rossum joins Microsoft New proposed DNS security features released Zoom has new tools to secure your Zoom meetings Malware activity increases 128% in Q3 Cisco Webex vulnerabilities allow attackers to spy on meetings Google will let you opt out of smart features FCC votes to open up more Wi-Fi Spectrum How vulnerable is G.P.…
T
This Week in Enterprise Tech (Video)


1
TWiET 420: Robotic Process Automation - Zoom's new security tools, should we still rely on G.P.S.?
1:10:48
1:10:48
Play later
Play later
Lists
Like
Liked
1:10:48
Python creator Guido van Rossum joins Microsoft New proposed DNS security features released Zoom has new tools to secure your Zoom meetings Malware activity increases 128% in Q3 Cisco Webex vulnerabilities allow attackers to spy on meetings Google will let you opt out of smart features FCC votes to open up more Wi-Fi Spectrum How vulnerable is G.P.…
T
This Week in Enterprise Tech (Video)


1
TWiET 419: Justifying the Cloud - Spreading Security Awareness in Business, Common Cloud Migration Mistakes
1:10:54
1:10:54
Play later
Play later
Lists
Like
Liked
1:10:54
Ghimob malware spies on Android apps Ransomware threats rise in manufacturing companies The danger of insecure APIs in organizations Hack-for-Hire group targets businesses Users are impressed with SpaceX Starlink CISA director Chris Krebs expects to be fired Spreading security awareness in your organization Ransomware group targets hospitals Hosts:…
T
This Week in Enterprise Tech (Audio)


1
TWiET 419: Justifying the Cloud - Spreading Security Awareness in Business, Common Cloud Migration Mistakes
1:10:54
1:10:54
Play later
Play later
Lists
Like
Liked
1:10:54
Ghimob malware spies on Android apps Ransomware threats rise in manufacturing companies The danger of insecure APIs in organizations Hack-for-Hire group targets businesses Users are impressed with SpaceX Starlink CISA director Chris Krebs expects to be fired Spreading security awareness in your organization Ransomware group targets hospitals Hosts:…
T
This Week in Enterprise Tech (Video)


1
TWiET 418: Back To Work With Envoy - Cyber disaster-recovery planning tips, post pandemic workplaces with Envoy
1:07:37
1:07:37
Play later
Play later
Lists
Like
Liked
1:07:37
Amazon to open another AWS region in India Online users feel safe, but still act risky Public beta for SpaceX's Starlink begins T-Mobile's misleading 5G claims Data Analysis containers found to have a lot of vulnerabilities Companies that offer services to help get workers back to the office The state of AT&T's 768kbps DSL service in 2020 9 Cyber d…
T
This Week in Enterprise Tech (Audio)


1
TWiET 418: Back To Work With Envoy - Cyber disaster-recovery planning tips, post pandemic workplaces with Envoy
1:07:38
1:07:38
Play later
Play later
Lists
Like
Liked
1:07:38
Amazon to open another AWS region in India Online users feel safe, but still act risky Public beta for SpaceX's Starlink begins T-Mobile's misleading 5G claims Data Analysis containers found to have a lot of vulnerabilities Companies that offer services to help get workers back to the office The state of AT&T's 768kbps DSL service in 2020 9 Cyber d…
T
This Week in Enterprise Tech (Video)


1
TWiET 417: Building A Remote Engineering Team - Distributed engineering teams with Upwork's VP of Product & Engineering Mike Paylor
1:08:31
1:08:31
Play later
Play later
Lists
Like
Liked
1:08:31
Home Depot confirms data breach exposing customer orders Ransomware wave targeting U.S. hospitals Hackers are looking for Oracle's disclosed server vulnerability China wants to lock down on mobile web browsers for spreading 'chaos' SANS Institute lauches CyberStart Program for all high school students U.K. to ban sales of carrier locked handsets Bu…
T
This Week in Enterprise Tech (Audio)


1
TWiET 417: Building A Remote Engineering Team - Distributed engineering teams with Upwork's VP of Product & Engineering Mike Paylor
1:08:31
1:08:31
Play later
Play later
Lists
Like
Liked
1:08:31
Home Depot confirms data breach exposing customer orders Ransomware wave targeting U.S. hospitals Hackers are looking for Oracle's disclosed server vulnerability China wants to lock down on mobile web browsers for spreading 'chaos' SANS Institute lauches CyberStart Program for all high school students U.K. to ban sales of carrier locked handsets Bu…