Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The weekly podcast by technologists, for technologists. Hosted by Cisco Champions.
…
continue reading
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
…
continue reading
Listen in on brief discussions among Cisco and industry experts about the latest issues in network security and the solutions available to help address your business challenges.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
The Cisco TAC Security Podcast Series is created by Cisco TAC engineers. Each episode provides an in-depth technical discussion of Cisco product security features, with emphasis on troubleshooting.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
…
continue reading
Welcome to "Securely Connected Everything," a dynamic podcast hosted by Michael van Rooyen (MVR), dedicated to exploring the intricate relationship between connectivity and security in the digital age. Each week, MVR welcomes guests from diverse backgrounds, to shed some light on cutting-edge technologies and methodologies that enhance digital experiences while safeguarding against potential threats. From exploring the origins and capabilities of innovative solutions, to dissecting the impli ...
…
continue reading
The straight up security news in 20 minutes or less! Get the latest reports on breaches, security research, new vulnerabilities and more!
…
continue reading
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
My Name Is Sai Charan Paloju, I'm From India. I’ll take Interviews of Different Country people who are into Different Professions who are from Different parts of the Planet.
…
continue reading
IT in the Bay podcast is bringing you causal enterprise IT conversations about networking, security and collaboration.
…
continue reading
Stories about technology, mobility, the cloud, social media, collaboration and cyber security. From Cisco headquarters in the Silicon Valley.
…
continue reading
A new beginning in IT
…
continue reading
The straight up security news in 20 minutes or less! Links to all news articles are included here.
…
continue reading
Custom Posts - Blip - Blip
…
continue reading
Join co-hosts A.J., Andy, Dan, Tim, Kevin, and our guests as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peak behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | ...
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
This is a podcast about my journey into information security it will be full of things that I've learned over the years and also things that I have researched and find interesting and want to present to you the audience.
…
continue reading
Introduction to the Internet of Everything (I2IoE) Summary
…
continue reading
Bringing you direct access to Pure Storage thought leaders, technology experts, alliance partners, customer insights, and our latest product news.
…
continue reading
Interviewing partner experts, I get to ask the questions and get personal insights into the topics we all talk about; game-changing technologies that construct this complex matrix of information that we frequently use as we live, work and play.
…
continue reading
Catch up on the latest information security news with our fortnightly podcast. Also, keep an eye out for webinars and author interviews, where we speak with industry experts about information security, cyber security, data privacy and much, much more.
…
continue reading
1
DABCC Radio: Cloud, Desktop, Mobility, Virtualization Podcasts (Citrix, VMware, Microsoft)
Douglas A. Brown (DABCC.com)
DABCC Radio is IT News talk show hosted by Douglas Brown, MVP, CTP, vEXPERT. Douglas interviews the who’s of the Citrix, Microsoft, VMware related cloud, desktop, EUC, mobility, security, storage, and virtualization world today! DABCC Radio is hosted by Douglas A. Brown, MVP, CTP, vEXPERT Douglas Brown is the Founder and President of DABCC, Inc. Doug has more than 20 years of experience in virtualization, cloud, and server based computing technologies and markets. DABCC is the first and most ...
…
continue reading
Join three telecom industry leaders as they discuss tips and tricks in the Unified Communications world. Plus, meet their expert guests who share their own unique perspectives on the industry.
…
continue reading
"Conf T with your SE" is a trailblazing podcast designed specifically for the tech-savvy listener. Launched in 2019, it brings together thought leaders, experts, and enthusiasts in the world of technology to spark insightful discussions, share industry trends, and tackle complex technical concepts in an accessible and engaging way. Hosted by seasoned systems engineer, Bryan Young, the show breaks down the barriers between the intricate world of computer networking and software and the everyd ...
…
continue reading
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
…
continue reading
A podcast about unleashing the full potential in people and technology. When people and technology come together, the potential is limitless. But while everyone is used to hearing about the revolutionary impact of tech, it can be easy to forget about the people behind it all. This podcast shines a light on the human side of innovation, as co-hosts Aaron Brooks and Heather Haskin explore and reframe our relationship to technology.
…
continue reading
Want to know more about the human side of cybersecurity? This is the show for you. Each week, Tessian's Tim Sadler meets with security experts and business leaders to discuss everything from security cultures, hackers, social engineering and insider threats.
…
continue reading
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
…
continue reading
https://youtu.be/GnxViRW1A24This week on the podcast, we cover a nation-state backed attack against Cisco ASA appliances which Cisco TALOS themselves have dubbed "ArcaneDoor." After that, we discuss a phishing tookit being used to target LastPass users before ending with a new way to deliver malware payloads using legitimate services.…
…
continue reading
1
TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland - SWN #381
38:11
38:11
Play later
Play later
Lists
Like
Liked
38:11
TikTok, Flowmon, Arcane Door, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-381
…
continue reading
1
‘ArcaneDoor’ Cyberspies Hacked Cisco Firewalls to Access Government Networks
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25
Sources suspect China is behind the targeted exploitation of two zero-day vulnerabilities in Cisco’s security appliances. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy SpokenLayer
…
continue reading
1
Cyber Security Today, April 26, 2024 - Patch warnings for Cisco ASA gateways and a WordPress plugin
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42
This episode reports on the malicious plugin worm that refuses to die, and moreBy Howard Solomon
…
continue reading
1
S11|E9 Simplified Management and Security with SD-Routing
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48
Many Cisco enterprise customers have decades of Catalyst routing and security capabilities functioning at branch locations. As distributed sites grow in complexity, networking teams must rethink how to manage and secure these locations more efficiently with automation and policy management.Listen in as we discuss how Cisco SD-Routing is the ideal s…
…
continue reading
1
Week in Review: Cisco MFA breach, Bad bots surge, Microsoft mail breach fallout
26:56
26:56
Play later
Play later
Lists
Like
Liked
26:56
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Dan Walsh, CISO, Paxos Thanks to our show sponsor, Conveyor Happy Friday! Are you tired of hearing about Conveyor’s AI security review automation software? We’ll stop talking about it if you book a call. Ready to give the market leading …
…
continue reading
1
Chatting With Erika Dietrick- Developer Advocate (Security) At Cisco, MS in Software Engineering, CCNA, DevNet Associate, GitLab TeamOps from Durham, North Carolina, United States
56:17
56:17
Play later
Play later
Lists
Like
Liked
56:17
Chatting With Erika Dietrick- Developer Advocate (Security) At Cisco, MS in Software Engineering, CCNA, DevNet Associate, GitLab TeamOps from Durham, North Carolina, United States- Erika Dietrick said about her work and answered some of my questions. more info at https://smartcherrysthoughts.com
…
continue reading
1
Recruiters Are Going Analog to Fight the AI Application Overload
10:38
10:38
Play later
Play later
Lists
Like
Liked
10:38
Indeed and LinkedIn are incorporating more generative AI to improve the recruiting and job-hunting processes. Some recruiters are still unconvinced. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy SpokenLayer
…
continue reading
1
Board's Pivotal Role in Cybersecurity as CISO-CEO Communication Gaps Continue - BSW #348
31:48
31:48
Play later
Play later
Lists
Like
Liked
31:48
In the leadership and communications section, The Board's Pivotal Role in Steering Cybersecurity, CISO-CEO communication gaps continue to undermine cybersecurity, The Essence of Integrity in Leadership: A Pillar of Trust and Excellence, and more! Show Notes: https://securityweekly.com/bsw-348
…
continue reading
1
USPS phishing, UK IoT law, industrial USB attacks
7:06
7:06
Play later
Play later
Lists
Like
Liked
7:06
USPS phishing sites are popular UK bans bad IoT credentials USB malware attacks targeting industrial sites Thanks to our episode sponsor, Dropzone AI Attention cybersecurity professionals! Are you investigating 100% of the alerts from your IT and security systems? Dropzone.ai's AI Analyst autonomously investigates every alert without playbooks or c…
…
continue reading
1
Meet Silver SAML: Golden SAML in the Cloud - Eric Woodruff - BSW #348
59:35
59:35
Play later
Play later
Lists
Like
Liked
59:35
A hybrid workforce requires hybrid identity protection. But what are the threats facing a hybrid workforce? As identity becomes the new perimeter, we need to understand the attacks that can allow attackers access to our applications. Eric Woodruff, Product Technical Specialist at Semperis, joins Business Security Weekly to discuss those attacks, in…
…
continue reading
1
Meet Silver SAML: Golden SAML in the Cloud - Eric Woodruff - BSW #348
27:57
27:57
Play later
Play later
Lists
Like
Liked
27:57
A hybrid workforce requires hybrid identity protection. But what are the threats facing a hybrid workforce? As identity becomes the new perimeter, we need to understand the attacks that can allow attackers access to our applications. Eric Woodruff, Product Technical Specialist at Semperis, joins Business Security Weekly to discuss those attacks, in…
…
continue reading
1
An unprecedented surge in credential stuffing.
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42
Okta warns of a credential stuffing spike. A congressman looks to the EPA to protect water systems from cyber threats. CISA unveils security guidelines for critical infrastructure. Researchers discover a stealthy botnet-as-a-service coming from China. The UK prohibits easy IoT passwords. New vulnerabilities are found in Intel processors. A global b…
…
continue reading
1
Tech Bytes: Using ZTNA for VPN Consolidation, Protecting Dev Access with SSE (Sponsored)
18:53
18:53
Play later
Play later
Lists
Like
Liked
18:53
Zero Trust Network Access, or ZTNA, is a core element of a Security Service Edge because it enables secure remote access to on-prem and cloud-based applications. On today’s episode, sponsored by HPE Aruba Networking, we dig into ZTNA from HPE’s perspective and hear customer stories on how it’s being used for third-party access, VPN consolidation,..…
…
continue reading
1
The Biggest Deepfake Porn Website Is Now Blocked in the UK
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08
The world's most-visited deepfake website and another large competing site are stopping people in the UK from accessing them, days after the UK government announced a crackdown. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy SpokenLayer
…
continue reading
1
Cyber Security Today, April 29, 2024 - Credential stuffing attacks are hitting firms using Okta ID management solutions, and more
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10
This episode reports on a job scam aimed at app developers, the latest data breach notifications and moreBy Howard Solomon
…
continue reading
1
Kaiser Permanente breach, DSH Safety Board, Okta stuffing attack
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45
Kaiser Permanente website tracking tools may have compromised customer data DHS announces AI safety board Okta warns of “unprecedented” credential stuffing attacks on customers Thanks to our episode sponsor, Dropzone AI Introducing Dropzone.ai, the industry's first AI Autonomous SOC Analyst. Their patented LLM replicates the techniques of elite ana…
…
continue reading
Remember the ‘90s when Micrososft was the big bad wolf with their anti-competitive methods of pushing Internet Explorer at the expense of Netscape and other non-microsoft browsers? Now the eye of Sauron has turned on Apple and today we are going to discuss the current landscape of phones, app stores, and everything else that it seems all the tech p…
…
continue reading
1
Chatting With Author Of A Dance Of Mist & Fury- Rachel Morley From California, United States
1:07:44
1:07:44
Play later
Play later
Lists
Like
Liked
1:07:44
Chatting With Author Of A Dance Of Mist & Fury- Rachel Morley From California, United States- R.A Morley said about her work and answered some of my questions. more info at https://smartcherrysthoughts.com
…
continue reading
1
Encore: Jack Rhysider: Get your experience points in everything. [Media] [Career Notes]
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54
Host of Darknet Diaries podcast Jack Rhysider shares his experiences from studying computer engineering at university to his strategy of using gamification on his career that led to him landing in the security space. Jack talks about how his wide experiences came together in security and what prompted him to learn podcasting. Jack endeavors to shar…
…
continue reading
1
Cerber ransomware strikes Linux. [Research Saturday]
15:34
15:34
Play later
Play later
Lists
Like
Liked
15:34
Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. The research states "Cerber emerged and was at the peak of its activity…
…
continue reading
1
Week in Review: GitHub comments abused, networkless” attack techniques, Police bodycam AI reports
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, Veracode Get ready to experience the future of application security at RSAC 2024 with Veracode. Join us as we unveil cutting-edge innovations and insights to tackl…
…
continue reading
1
Threat Modeling and Understanding Inherent Threats - Adam Shostack - ESW #359
44:34
44:34
Play later
Play later
Lists
Like
Liked
44:34
This is a great interview with Adam Shostack on all things threat modeling. He's often the first name that pops into people's heads when threat modeling comes up, and has created or been involved with much of the foundational material around the subject. Adam recently released a whitepaper that focuses on and defines inherent threats. Resources: He…
…
continue reading
Healthcare providers report breaches affecting millions. PlugX malware is found in over 170 countries. Hackers exploit an old vulnerability to launch Cobalt Strike. A popular Wordpress plugin is under active exploitation. Developing nations may serve as a test bed for malware developers. German authorities question Microsoft over Russian hacks. CIS…
…
continue reading
1
Cyber Security Today, Week in Review for week ending Friday, April 26, 2024
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18
This episode features a discussion on the latest in the Change Healthcare ransomware attack, a vulnerability in an abandoned Apache open-source project, the next step in Canada's proposed critical infrastructure cybersecurity law and the future of TikTokBy Howard Solomon
…
continue reading
1
TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland - SWN #381
38:18
38:18
Play later
Play later
Lists
Like
Liked
38:18
TikTok, Flowmon, Arcane Door, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-381
…
continue reading
1
TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland - SWN #381
38:11
38:11
Play later
Play later
Lists
Like
Liked
38:11
TikTok, Flowmon, Arcane Door, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-381
…
continue reading
1
TikTok, Flowmon, Cisco, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland - SWN #381
38:18
38:18
Play later
Play later
Lists
Like
Liked
38:18
TikTok, Flowmon, Arcane Door, Brokewell, RuggedCom, Deepfakes, Non-Competes, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-381
…
continue reading
1
Chatting With Red Team Hacker.Assembly/Bash/Python/C# Programmer. 21 Km A Day Cardio. Viking- Leigh Trinity From Newfoundland, Canada
44:19
44:19
Play later
Play later
Lists
Like
Liked
44:19
Chatting With Red Team Hacker.Assembly/Bash/Python/C# Programmer. 21 Km A Day Cardio. Viking- Leigh Trinity From Newfoundland, Canada- Leigh Trinity said about her work and answered some of my questions. more info at https://smartcherrysthoughts.com
…
continue reading
1
Trends in Enterprise Imaging: How Better Storage Can Drive Better Patient Outcomes
49:24
49:24
Play later
Play later
Lists
Like
Liked
49:24
Explore the trends in enterprise imaging with Mark Dobbs, Pure's Global Healthcare Alliances Director who specializes in healthcare imaging solutions. Whether you're directly involved in healthcare IT or just interested in the impact in imaging that affects everyone, this is a great listen to see how Cloud, modern architectures, and AI are changing…
…
continue reading
1
How GenAI Can Improve SecOps - Ely Kahn - ESW #359
30:18
30:18
Play later
Play later
Lists
Like
Liked
30:18
We've talked about generative AI in a general sense on our podcast for years, but we haven't done many deep dives into specific security use cases. That ends with this interview, as we discuss how generative AI can improve SecOps with Ely Kahn. Some of the use cases are obvious, while others were a complete surprise to me. Check out this episode if…
…
continue reading
After a recent spike in brute force attempts targeting SSH and VPN services, we felt it was a good time to give listeners a lesson on brute force attacks. Nick Biasini joins host Jon Munshaw this week to discuss the basics of these methods, how administrators can protect their accounts, and other potential defense mechanisms (or whether to just tak…
…
continue reading
1
Google postpones cookies, Brocade vulnerability warning, ICICI card gaffe
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27
Google postpones third-party cookie deprecation Brocade SAN appliances and switches exposed to hacking ICICI Bank exposes credit cards to wrong users Thanks to this week's episode sponsor, Veracode Don't miss out on this opportunity to elevate your cybersecurity strategy. Build and scale secure software from code to cloud with speed and trust. Visi…
…
continue reading