The weekly podcast by technologists, for technologists. Hosted by Cisco Champions.
…
continue reading
The Cisco Podcast Network is a collective of podcasts from across Cisco spanning technology to culture and everything in between. Hear from Cisco customers, partners, and Cisco insiders on the topics that matter most to you. Email us with your feedback and suggestions. Discover your favorite playlists today!
…
continue reading
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
The Cisco Kid came to radio October 2, 1942, with Jackson Beck in the title role and Louis Sorin as Pancho. With Vicki Vola and Bryna Raeburn in supporting roles and Michael Rye announcing, this series continued on Mutual until 1945. It was followed by another Mutual series in 1946, starring Jack Mather and Harry Lang, who continued to head the cast in the syndicated radio series of more than 600 episodes from 1947 to 1956.
…
continue reading
Jump-start your use of the Cisco Learning Network's dynamic features and vibrant community offerings. Here you will find technical information and professional networking opportunities, which will help advance your certification goals. By joining the Cisco Learning Network you will be a part of the community, prepare for success, interact with professionals, mentor, share, and achieve.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
The Cisco Kid was a popular film, radio, television and comic book series based on the fictional Western character created by O. Henry in his short story, “The Caballero’s Way,” published in 1907 in the collection Heart of the West. Films and television depicted the Cisco Kid as a heroic Mexican caballero, although in O. Henry’s original story he was a non-Hispanic character and a cruel outlaw probably modeled on Billy the Kid. The Cisco Kid came to radio October 2, 1942, with Jackson Beck i ...
…
continue reading
Join us as we chat with experts from inside and outside Cisco Meraki. Hear about the latest in technology and the people and culture that drive the business. We’d love to hear your feedback—share it with us at community.meraki.com.
…
continue reading
This is a (probably) limited series where Tony Bourke, a networking instructor (Arista, Cisco, etc.) talks in a vendor-neutral way about the process of network automation, the basic concepts, and where everything falls into place.
…
continue reading
Welcome to Ventev's podcast! Here you can listen to industry and subject matter experts share their knowledge and experiences around wireless network deployment, interoperability with leading network manufacturers, innovative solutions from Ventev, and much more. Hosted by master podcaster, Jonathan Davy, and industry expert, Jared VanAllen, in the United States, follow our podcast for the latest episodes twice a month!
…
continue reading
A program about network technology, sponsored by Cisco.
…
continue reading
XenTegra podcasts are about ServiceNow, Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
…
continue reading
…
continue reading
A video podcast showing Cisco hands-on training exercises.
…
continue reading
Listen in on brief discussions among Cisco and industry experts about the latest issues in network security and the solutions available to help address your business challenges.
…
continue reading
Listen to Cisco experts discuss industry, business, and technology topics pertinent to the Unified Workspace. Learn how Cisco Unified Communications solutions and services can help organizations solve cost, productivity, and process issues.
…
continue reading
The Quantum Divide is a podcast focussing on quantum technology, with a slant towards networking. Do you work in the IT industry, want to learn about quantum technologies, and are daunted by the extraordinarily high bar for deep comprehension? Yeah, me too. Join our podcast to hear interesting talks about quantum technology concepts, and fascinating interviews from individuals in the industry. (Opinions expressed by Steve & Dan belong only to them, and not their employer)
…
continue reading
Your online resource for discussion about issues that impact women in technology, women in leadership and everything in between.
…
continue reading
Join co-hosts A.J., Andy, Dan, Tim, Kevin, and our guests as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peak behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | ...
…
continue reading
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
…
continue reading
Listen in on discussions with Cisco and industry experts regarding business, design, and deployment considerations of SSL VPN in focused 10-15 minute topics. This will be a series of seven discussions, occurring once monthly.
…
continue reading
Podcast by Cisco Northern Europe Podcast
…
continue reading
Adventures in the reselling world in the Bay Area, CA an in depth look at iPhone repairs sourcing and goodwill hunting to flip on eBay and the life that happens along the way
…
continue reading
How does technology influence our lives, work and relationships? Join Cisco co-hosts Collette and Rosie as they embrace a balanced life in the tech world and interview inspiring guests. Disclaimer: We like things explained simple. We’ll take the tech acronyms out and put the fun in.
…
continue reading
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
This series of programs for education IT professionals covers unified communications topics and applications.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
MACRO is a brand new podcast series from the Innovation team at Cisco. With each episode of MACRO, we'll explore some of the many ways that technology is changing the world – and changing it for the better. We’ll provide the big picture, as well as those all-important close-ups.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
打造夢幻Internet - 洪李吉 的Internet技術部落格
…
continue reading
The Mouthpiece Hustlers Podcast is the podcast for StartUp Talk, HipHop Culture, Urban commentary, Adult Entertainment, and much more. Cisco Lucci is a Podcast and Social Media personality with a background in Radio, Cannabis, Insurance, & Talent Management.
…
continue reading
Go beyond the network with Cisco IT. Discover the innovation, thought leadership and everyday life of those in Cisco’s enterprise IT organization. Join us as we explore the world of technology, one story at a time.
…
continue reading
Stories about technology, mobility, the cloud, social media, collaboration and cyber security. From Cisco headquarters in the Silicon Valley.
…
continue reading
Understanding today’s topics from a practical Christian perspective Support this podcast: https://podcasters.spotify.com/pod/show/cisco-valenzuela/support
…
continue reading
You're Not Ready Podcast hosted by Cisco -- Comedian, Speaker, Football Coach. Cisco likes to speak of his personal evolution using humor and complete transparency. Join him on his journey, whether it be solos, with friends or, his favorite, just everyday people. In any case, the show is guaranteed to be funny thought provoking and evolving.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
TALK ABOUT WHAT IS GOING ON IN EDUCATION. WE ADDRESS SOCIAL ISSUES SUCH AS BEING CONSERVATIVE ON CAMPUS, AFFIRMATIVE ACTION, CURRICULUM, JOBS, AND COURSES
…
continue reading
Introduction to the Internet of Everything (I2IoE) Summary
…
continue reading
CISCO ROUTER have expanded throughout in recent years. But the CISCO ROUTER Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your CISCO ROUTER or CISCO ROUTER account, then fret not! You can establish contact with the expert team of CISCO ROUTER by dialing up the CISCO ROUTER Tech Support Phone Number +1 866-760-7833 US/CA and let them solve your issues easily! read less
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
How might we design the future of work?
…
continue reading
1
Inside Outside Innovation
Brian Ardinger, Founder of Inside Outside Innovation podcast, InsideOutside.io, and the Inside Outside Innovation Summit
Inside Outside Innovation explores the ins and outs of innovation with raw stories, real insights, and tactical advice from the best and brightest in startups & corporate innovation. Each week we bring you the latest thinking on talent, technology, and the future of innovation. Join our community of movers, shakers, makers, founders, builders, and creators to help speed up your knowledge, skills, and network. Previous guests include thought leaders such as Brad Feld, Arlan Hamilton, Jason Ca ...
…
continue reading
Explore the unknown with us. Conspiracy Theories, Aliens, Paranormal, Demons, Occult, Bigfoot, Reptilians, Cryptozoology, Conspiracies, Supernatural, UFOs. We seek the truth & provide the most interesting, thought-provoking questions & conspiracies. Dedicated to seeking the truth & waking the masses. https://www.TheoriesoftheThirdKind.com For advertising opportunities please email PodcastPartnerships@Studio71us.com We want to make the podcast even better, help us learn how we can: https://bi ...
…
continue reading
1
Inside the ChatGPT Outage & More News | Pulse Update
20:09
20:09
Play later
Play later
Lists
Like
Liked
20:09
Go under the hood of a ChatGPT outage, H&R Block’s Tax Day disruption, and more incidents from the past few weeks. The Internet Report team will also discuss Microsoft’s update on recent subsea cable cuts and the latest global outage trends.———CHAPTERS:00:00 Intro00:57 ChatGPT Outage03:35 Revisiting West Coast of Africa Cable Cuts09:07 H&R Block Ou…
…
continue reading
1
‘ArcaneDoor’ Cyberspies Hacked Cisco Firewalls to Access Government Networks
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25
Sources suspect China is behind the targeted exploitation of two zero-day vulnerabilities in Cisco’s security appliances. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy SpokenLayer
…
continue reading
1
Cyber Security Today, April 26, 2024 - Patch warnings for Cisco ASA gateways and a WordPress plugin
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42
This episode reports on the malicious plugin worm that refuses to die, and moreBy Howard Solomon
…
continue reading
1
Risky Biz News: Cisco zero-day fun time is here!
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Patrick Gray.You can find the newsletter version of this podcast here.
…
continue reading
1
The shadowy adversary in Cisco's crosshairs.
29:31
29:31
Play later
Play later
Lists
Like
Liked
29:31
Cisco releases urgent patches for their Adaptive Security Appliances. Android powered smart TVs could expose Gmail inboxes. The FTC refunds millions to Amazon Ring customers. The DOJ charges crypto-mixers with money laundering. A critical vulnerability has been disclosed in the Flowmon network monitoring tool. A Swiss blood donation company reopens…
…
continue reading
In this episode of the "What's the deal with" series, Community Manager Matt Saunders, and Lead Technical Advocate Kareem Iskander answer the question, what’s the deal with Observability? Matt and Kareem dive deep into the finer details of Observability and discuss the resources and certifications Cisco has produced that ensure your learning and va…
…
continue reading
1
S11|E9 Simplified Management and Security with SD-Routing
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48
Many Cisco enterprise customers have decades of Catalyst routing and security capabilities functioning at branch locations. As distributed sites grow in complexity, networking teams must rethink how to manage and secure these locations more efficiently with automation and policy management.Listen in as we discuss how Cisco SD-Routing is the ideal s…
…
continue reading
Original Air Date: September 29, 1953 Host: Andrew Rhynes Show: The Cisco Kid Phone: (707) 98 OTRDW (6-8739) Stars: • Jack Mather (Cisco) • Harry Lang (Poncho) Exit music from: Roundup on the Prairie by Aaron Kenny https://bit.ly/3kTj0kKBy Andrew Rhynes
…
continue reading
Railroad_Car
…
continue reading
1
Week in Review: Cisco MFA breach, Bad bots surge, Microsoft mail breach fallout
26:56
26:56
Play later
Play later
Lists
Like
Liked
26:56
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Dan Walsh, CISO, Paxos Thanks to our show sponsor, Conveyor Happy Friday! Are you tired of hearing about Conveyor’s AI security review automation software? We’ll stop talking about it if you book a call. Ready to give the market leading …
…
continue reading
In the fall of 1964, an individual is hunted down by Robotic Alien humanoid creatures in the dark forests of California. After 12 hours of a terrifying encounter, the individual escapes and reports to officials what occurred. It is one of the World’s most intriguing and least known UFO cases. Good things come in big packages at MeUndies. Get 20% of…
…
continue reading
1
Cerber ransomware strikes Linux. [Research Saturday]
15:34
15:34
Play later
Play later
Lists
Like
Liked
15:34
Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. The research states "Cerber emerged and was at the peak of its activity…
…
continue reading
1
Cisco Optics Podcast Ep 52. The smartest data center operators use multi-mode fiber - do you? (1/7)
14:33
14:33
Play later
Play later
Lists
Like
Liked
14:33
Multi-mode fiber has been the workhorse for fiber optic communication within a data center for years, as well as the choice for Ethernet backbones in office buildings. It has a rich history that goes all the way back to the first optical fiber standards when 100 megabits per second was a huge data rate. Anybody remember those days?In Episode 52, we…
…
continue reading
1
Week in Review: GitHub comments abused, networkless” attack techniques, Police bodycam AI reports
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, Veracode Get ready to experience the future of application security at RSAC 2024 with Veracode. Join us as we unveil cutting-edge innovations and insights to tackl…
…
continue reading
Healthcare providers report breaches affecting millions. PlugX malware is found in over 170 countries. Hackers exploit an old vulnerability to launch Cobalt Strike. A popular Wordpress plugin is under active exploitation. Developing nations may serve as a test bed for malware developers. German authorities question Microsoft over Russian hacks. CIS…
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday, April 26, 2024
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18
This episode features a discussion on the latest in the Change Healthcare ransomware attack, a vulnerability in an abandoned Apache open-source project, the next step in Canada's proposed critical infrastructure cybersecurity law and the future of TikTokBy Howard Solomon
…
continue reading
After a recent spike in brute force attempts targeting SSH and VPN services, we felt it was a good time to give listeners a lesson on brute force attacks. Nick Biasini joins host Jon Munshaw this week to discuss the basics of these methods, how administrators can protect their accounts, and other potential defense mechanisms (or whether to just tak…
…
continue reading
1
Google postpones cookies, Brocade vulnerability warning, ICICI card gaffe
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27
Google postpones third-party cookie deprecation Brocade SAN appliances and switches exposed to hacking ICICI Bank exposes credit cards to wrong users Thanks to this week's episode sponsor, Veracode Don't miss out on this opportunity to elevate your cybersecurity strategy. Build and scale secure software from code to cloud with speed and trust. Visi…
…
continue reading
1
Cyber Talent Insights: Strengthening the cyber talent pipeline apparatus. (Part 3 of 3) [Special Edition]
55:00
55:00
Play later
Play later
Lists
Like
Liked
55:00
Join us for this special three-part series where the N2K Cyber Talent Insights team guides you through effective strategies to develop your cybersecurity team, helping you stay ahead in the constantly changing cybersecurity landscape. In this episode, we center our conversation around the Cyber Workforce Pipeline. We discuss where the next great wa…
…
continue reading
1
Chinese keyboard flaws, hacked news story, TikTok on the clock
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41
Chinese keyboard app flaws exposed Threat actors plant fake assassination story ByteDance on the clock to divest TikTok Thanks to this week's episode sponsor, Veracode Research reveals AI-generated code mirrors human-written code's security flaws. Even seasoned programmers struggle to spot errors, with incorrect AI-generated answers abound. Veracod…
…
continue reading
In 1991, an unsolved quadruple homicide took place at an I Can't Believe It's Yogurt! shop in Austin. All the victims were teenage girls and killed execution style. DNA was eventually found at the scene but the FBI refused to turn over the identity of the individual. Celebrate 4/20 exactly how you want to with MOOD. Get 20% off your first order plu…
…
continue reading
1
North Koreans Secretly Animated Amazon and Max Shows, Researchers Say
9:25
9:25
Play later
Play later
Lists
Like
Liked
9:25
Thousands of exposed files on a misconfigured North Korean server hint at one way the reclusive country may evade international sanctions. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy SpokenLayer
…
continue reading
1
Srsly Risky Biz: Sandworm an inspiration for hostile actors
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30
In this podcast Adam Boileau and Tom Uren talk about what there is to learn from Mandiant’s report into the GRU Sandworm crew. Are the Russians a model for other actors, or just a get-‘er-done bunch of pragmatists? They also talk about an attempt to build a World Cybercrime Index, assessing different national cybercrime specialisations.…
…
continue reading
The DOJ indicts four Iranian nationals on hacking charges. Legislation to ban or force the sale of TikTok heads to the President’s desk. A Russian hack group claims a cyberattack on an Indiana water treatment plant. A roundup of dark web data leaks. Mandiant monitors dropping dwell times. Bcrypt bogs down brute-forcing. North Korean hackers target …
…
continue reading
1
Change Healthcare Finally Admits It Paid Ransomware Hackers—and Still Faces a Patient Data Leak
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55
The company belatedly conceded both that it had paid the cybercriminals extorting it and that patient data nonetheless ended up on the dark web. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy SpokenLayer
…
continue reading
1
Ep 144 - A Deep Dive into the Choreography of Connectivity and Critical Network Services
52:26
52:26
Play later
Play later
Lists
Like
Liked
52:26
This episode was recorded January 4th, 2024 Join the virtual gathering around our tech-infused roundtable as we weave personal holiday tales with the threads of networking expertise. A.J. is joined by hosts Andy and Tim, who bring their personal flair to the table—Andy with his camera lens capturing life's moments, and Tim as he steps into his new …
…
continue reading
1
Cyber Security Today, April 24, 2024 - Good news/bad news in Mandiant report, UnitedHealth admits paying a ransomware gang, and more
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16
This episode reports on the danger of using expired open-source packages, a tool used by a Russian hacking group and password adviceBy Howard Solomon
…
continue reading
1
Iranian hackers charged, Siemens fixing Palo bug, Russia hacks water plant
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56
Iranian nationals charged with hacking U.S. companies and agencies Siemens working to fix device affected by Palo Alto firewall bug Russian hackers claim cyberattack on Indiana water plant Thanks to this week's episode sponsor, Veracode Are you truly listening to both your security and development teams? Make informed decisions with Veracode. Our d…
…
continue reading
1
Risky Biz News: First US spyware visa ban hammer falls on 13 individuals
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Kaitlyn Sawrey.You can find the newsletter version of this podcast here.
…
continue reading
1
Visa crackdown against spyware swindlers.
35:52
35:52
Play later
Play later
Lists
Like
Liked
35:52
The State Department puts visa restrictions on spyware developers. UnitedHealth says its recent breach could affect tens of millions of Americans. LockBit leaks data allegedly stolen from the DC government. Microsoft says APT28 has hatched a GooseEgg. The White House and HHS update HIPAA rules to protect private medical data. Keyboard apps prove vu…
…
continue reading
1
Syncing with ServiceNow: ServiceNow Named a Worldwide Leader in Two IDC MarketScapes for Value Stream Management and Strategic Portfolio Management
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39
SANTA CLARA, Calif. – March 19, 2024 – ServiceNow (NYSE: NOW), the leading digital workflow company making the world work better for everyone, has been named a Leader in two IDC MarketScape vendor assessments: Worldwide Value Stream Management (VSM) and Agile Project and Portfolio Management 2023‑2024 Worldwide Strategic Portfolio Management (SPM) …
…
continue reading
1
AI, VC, & Data Insights into Corporate Innovation with Thomas Thurston of Ducera Partners
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55
On this week's episode of Inside Outside Innovation, we sit down with Thomas Thurston, Chief Technologist at Ducera Partners. Thomas and I talk about AI, venture capital, and some interesting data insights into what makes corporate innovation work or not work. Let's get started. Inside Outside Innovation is the podcast to help new innovators naviga…
…
continue reading
1
The Next US President Will Have Troubling New Surveillance Powers
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06
Over the weekend, president Joe Biden signed legislation not only reauthorizing a major FISA spy program but expanding it in ways that could have major implications for privacy rights in the US. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy SpokenLayer
…
continue reading
1
TikTok ban update, Sandworm hits Ukraine, North Korean streaming animators
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03
TikTok ban passes the US House Sandworm targets critical Ukrainian orgs North Koreans animating streaming shows Thanks to this week's episode sponsor, Veracode AI coding companions assist in generating high-quality code snippets, while Veracode swoops in to conduct thorough security assessments, identifying and fixing vulnerabilities quickly. With …
…
continue reading
Renegade
…
continue reading
Section 702 gets another two years. MITRE suffers a breach through an Ivanti VPN. CrushFTP urges customers to patch an actively exploited flaw. SafeBreach researchers disclose vulnerabilities in Windows Defender that allow remote file deletion. Ukrainian soldiers see increased attention from data-stealing apps. GitHub’s comments are being exploited…
…
continue reading
1
The Citrix Session: What’s new with HDX in the 2402 LTSR
23:00
23:00
Play later
Play later
Lists
Like
Liked
23:00
I’ve said this before, and I’ll say it again – if you are on the Citrix Long Term Service Release (LTSR) track, you’ve most likely been missing out on a lot of great features. But I get it; there are many valid reasons for choosing this path, including extended support. The good news is that Citrix Virtual Apps and Desktops 2402 LTSR is now availab…
…
continue reading
This Earth Day we celebrate the people behind #sustainability efforts at Cisco! In this episode of CX EMEA Unplugged, we meet Esther Roure Vila, Saumya Dubey, and Tiziano Canovai, and we find out how a surfer, a PhD student, and an avid camper brought their passion for sustainability to Cisco.By Cisco
…
continue reading
One juror in former US president Donald Trump’s criminal case in New York has been excused over fears she could be identified. It could get even messier. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy SpokenLayer
…
continue reading
1
Cyber Security Today, April 22, 2024 - Vulnerability found in CrushFTP file transfer software, security updates for Cisco's controller management application, and more
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10
This episode reports on a new campaign to steal credentials from LastPass users, a warning to admits of Ivanti Avalanche mobile device management software, and moreBy Howard Solomon
…
continue reading
1
RedLine GitHub connection, MITRE Ivanti breach, E-ZPass spoof sites
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29
RedLine stealer GitHub connection MITRE’s breached was through Ivanti zero-day vulnerabilities Researchers find dozens of fake E-ZPass toll websites following FBI warning Thanks to this week's episode sponsor, Veracode Imagine your intelligent coding companion, backed by the robust security expertise of Veracode. Together, we form the ultimate duo,…
…
continue reading
1
Sponsored: Pushing back the frontiers of vulnerability research
14:54
14:54
Play later
Play later
Lists
Like
Liked
14:54
In this Risky Business News sponsored interview, Tom Uren talks to Dan Guido, the CEO of security research company Trail of Bits. Dan and Tom discuss DARPA’s upcoming AI cyber challenge, in which Trail of Bits will compete to solve very difficult bug discovery challenges. They also talk about Trail of Bits’ approach to making some of its own tools …
…
continue reading
1
Risky Biz News: File transfer system hacking spree continues with a CrushFTP zero-day
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read today by Patrick Gray, as Claire Aird is unwell. You can find the newsletter version of this podcast here.
…
continue reading
1
Encore: Kiersten Todt: problem solving and building solutions. [Policy] [Career Notes]
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26
Managing director of the Cyber Readiness Institute Kiersten Todt shares how she came to be in the cybersecurity industry helping to provide free tools and resources for small businesses through a nonprofit. She describes how her work on the Hill prior to and just after 9/11 changed. Kiersten talks about the diversity of skills that benefit work in …
…
continue reading
1
Cloud Architect vs Detection Engineer: Mutual benefit. [CyberWire-X]
18:23
18:23
Play later
Play later
Lists
Like
Liked
18:23
In this episode of CyberWire-X, N2K CyberWire’s Podcast host Dave Bittner is joined by Brian Davis, Principal Software Engineer, and Thomas Gardner, Senior Detection Engineer, both from Red Canary. They engage in a cloud architect vs. detection engineer discussion. Through the conversation, they illustrate how one person benefits the other's work a…
…
continue reading
1
The art of information gathering. [Research Saturday]
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48
Greg Lesnewich, senior threat researcher at Proofpoint, sits down to discuss "From Social Engineering to DMARC Abuse: TA427’s Art of Information Gathering." Since 2023, TA427 has directly solicited foreign policy experts for their opinions on nuclear disarmament, US-ROK policies, and sanction topics via benign conversation starting emails. The rese…
…
continue reading
Two swift responses to recent cyberattacks. Frontier Communications discloses cyberattack. Texas town repels water system cyberattack by unplugging. List of undesirables falls into the wrong hands. CryptoChameleon phishing kit impersonates LastPass. Ransomware payments trending down in Q1 2024 and a warning for small to medium-sized businesses. US …
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday April 19, 2024
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57
On this episode Jen Ellis, co-chair of the Ransomware Task Force, talks about ways of fighting one of the biggest cyber threats to IT departmentsBy Howard Solomon
…
continue reading
One of Silicon Valley's most influential lobbying arms joins privacy reformers in a fight against the Biden administration-backed expansion of a major US surveillance program. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy SpokenLayer
…
continue reading