show episodes
 
Artwork
 
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
  continue reading
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
  continue reading
 
Get inside the minds of leading white-hat hackers and security researchers. Each week, we’ll educate and entertain you by breaking down and simplifying the latest cybersecurity headlines and trends. Using our special blend of expertise, wit, and cynicism, we’ll turn complex security concepts into easily understood and actionable insights.
  continue reading
 
Welcome to "Securely Connected Everything," a dynamic podcast hosted by Michael van Rooyen (MVR), dedicated to exploring the intricate relationship between connectivity and security in the digital age. Each week, MVR welcomes guests from diverse backgrounds, to shed some light on cutting-edge technologies and methodologies that enhance digital experiences while safeguarding against potential threats. From exploring the origins and capabilities of innovative solutions, to dissecting the impli ...
  continue reading
 
Artwork

1
The Art of Network Engineering

A.J., Andy, Dan, Tim, and Kevin

Unsubscribe
Unsubscribe
Monthly+
 
Join co-hosts A.J., Andy, Dan, Tim, Kevin, and our guests as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peak behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | ...
  continue reading
 
Artwork

1
Mac Admins Podcast

Mac Admins Podcast LLC

Unsubscribe
Unsubscribe
Weekly
 
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
  continue reading
 
Artwork

1
the Digital Matrix

Kurt Nordquist - Global IT Business Development Manager

Unsubscribe
Unsubscribe
Monthly
 
Interviewing partner experts, I get to ask the questions and get personal insights into the topics we all talk about; game-changing technologies that construct this complex matrix of information that we frequently use as we live, work and play.
  continue reading
 
Catch up on the latest information security news with our fortnightly podcast. Also, keep an eye out for webinars and author interviews, where we speak with industry experts about information security, cyber security, data privacy and much, much more.
  continue reading
 
DABCC Radio is IT News talk show hosted by Douglas Brown, MVP, CTP, vEXPERT. Douglas interviews the who’s of the Citrix, Microsoft, VMware related cloud, desktop, EUC, mobility, security, storage, and virtualization world today! DABCC Radio is hosted by Douglas A. Brown, MVP, CTP, vEXPERT Douglas Brown is the Founder and President of DABCC, Inc. Doug has more than 20 years of experience in virtualization, cloud, and server based computing technologies and markets. DABCC is the first and most ...
  continue reading
 
Artwork

1
Heads In The Cloud

Star2Star Communications

Unsubscribe
Unsubscribe
Monthly
 
Join three telecom industry leaders as they discuss tips and tricks in the Unified Communications world. Plus, meet their expert guests who share their own unique perspectives on the industry.
  continue reading
 
"Conf T with your SE" is a trailblazing podcast designed specifically for the tech-savvy listener. Launched in 2019, it brings together thought leaders, experts, and enthusiasts in the world of technology to spark insightful discussions, share industry trends, and tackle complex technical concepts in an accessible and engaging way. Hosted by seasoned systems engineer, Bryan Young, the show breaks down the barriers between the intricate world of computer networking and software and the everyd ...
  continue reading
 
Artwork

1
XenTegra - The Citrix Session

XenTegra / Andy Whiteside / Bill Sutton

Unsubscribe
Unsubscribe
Monthly+
 
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
  continue reading
 
A podcast about unleashing the full potential in people and technology. When people and technology come together, the potential is limitless. But while everyone is used to hearing about the revolutionary impact of tech, it can be easy to forget about the people behind it all. This podcast shines a light on the human side of innovation, as co-hosts Aaron Brooks and Heather Haskin explore and reframe our relationship to technology.
  continue reading
 
Want to know more about the human side of cybersecurity? This is the show for you. Each week, Tessian's Tim Sadler meets with security experts and business leaders to discuss everything from security cultures, hackers, social engineering and insider threats.
  continue reading
 
Artwork

1
Tech Bytes

Packet Pushers

Unsubscribe
Unsubscribe
Monthly+
 
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
  continue reading
 
Loading …
show series
 
Many Cisco enterprise customers have decades of Catalyst routing and security capabilities functioning at branch locations. As distributed sites grow in complexity, networking teams must rethink how to manage and secure these locations more efficiently with automation and policy management.Listen in as we discuss how Cisco SD-Routing is the ideal s…
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Dan Walsh, CISO, Paxos Thanks to our show sponsor, Conveyor Happy Friday! Are you tired of hearing about Conveyor’s AI security review automation software? We’ll stop talking about it if you book a call. Ready to give the market leading …
  continue reading
 
Chatting With Erika Dietrick- Developer Advocate (Security) At Cisco, MS in Software Engineering, CCNA, DevNet Associate, GitLab TeamOps from Durham, North Carolina, United States- Erika Dietrick said about her work and answered some of my questions. more info at https://smartcherrysthoughts.com
  continue reading
 
In the leadership and communications section, The Board's Pivotal Role in Steering Cybersecurity, CISO-CEO communication gaps continue to undermine cybersecurity, The Essence of Integrity in Leadership: A Pillar of Trust and Excellence, and more! Show Notes: https://securityweekly.com/bsw-348
  continue reading
 
USPS phishing sites are popular UK bans bad IoT credentials USB malware attacks targeting industrial sites Thanks to our episode sponsor, Dropzone AI Attention cybersecurity professionals! Are you investigating 100% of the alerts from your IT and security systems? Dropzone.ai's AI Analyst autonomously investigates every alert without playbooks or c…
  continue reading
 
A hybrid workforce requires hybrid identity protection. But what are the threats facing a hybrid workforce? As identity becomes the new perimeter, we need to understand the attacks that can allow attackers access to our applications. Eric Woodruff, Product Technical Specialist at Semperis, joins Business Security Weekly to discuss those attacks, in…
  continue reading
 
A hybrid workforce requires hybrid identity protection. But what are the threats facing a hybrid workforce? As identity becomes the new perimeter, we need to understand the attacks that can allow attackers access to our applications. Eric Woodruff, Product Technical Specialist at Semperis, joins Business Security Weekly to discuss those attacks, in…
  continue reading
 
Okta warns of a credential stuffing spike. A congressman looks to the EPA to protect water systems from cyber threats. CISA unveils security guidelines for critical infrastructure. Researchers discover a stealthy botnet-as-a-service coming from China. The UK prohibits easy IoT passwords. New vulnerabilities are found in Intel processors. A global b…
  continue reading
 
Zero Trust Network Access, or ZTNA, is a core element of a Security Service Edge because it enables secure remote access to on-prem and cloud-based applications. On today’s episode, sponsored by HPE Aruba Networking, we dig into ZTNA from HPE’s perspective and hear customer stories on how it’s being used for third-party access, VPN consolidation,..…
  continue reading
 
Kaiser Permanente website tracking tools may have compromised customer data DHS announces AI safety board Okta warns of “unprecedented” credential stuffing attacks on customers Thanks to our episode sponsor, Dropzone AI Introducing Dropzone.ai, the industry's first AI Autonomous SOC Analyst. Their patented LLM replicates the techniques of elite ana…
  continue reading
 
Remember the ‘90s when Micrososft was the big bad wolf with their anti-competitive methods of pushing Internet Explorer at the expense of Netscape and other non-microsoft browsers? Now the eye of Sauron has turned on Apple and today we are going to discuss the current landscape of phones, app stores, and everything else that it seems all the tech p…
  continue reading
 
Host of Darknet Diaries podcast Jack Rhysider shares his experiences from studying computer engineering at university to his strategy of using gamification on his career that led to him landing in the security space. Jack talks about how his wide experiences came together in security and what prompted him to learn podcasting. Jack endeavors to shar…
  continue reading
 
Christopher Doman, Co-Founder and CTO at Cado Security, is talking about their research on "Cerber Ransomware: Dissecting the three heads." This research delves into Cerber ransomware being deployed onto servers running the Confluence application via the CVE-2023-22518 exploit. The research states "Cerber emerged and was at the peak of its activity…
  continue reading
 
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, Veracode Get ready to experience the future of application security at RSAC 2024 with Veracode. Join us as we unveil cutting-edge innovations and insights to tackl…
  continue reading
 
This is a great interview with Adam Shostack on all things threat modeling. He's often the first name that pops into people's heads when threat modeling comes up, and has created or been involved with much of the foundational material around the subject. Adam recently released a whitepaper that focuses on and defines inherent threats. Resources: He…
  continue reading
 
Healthcare providers report breaches affecting millions. PlugX malware is found in over 170 countries. Hackers exploit an old vulnerability to launch Cobalt Strike. A popular Wordpress plugin is under active exploitation. Developing nations may serve as a test bed for malware developers. German authorities question Microsoft over Russian hacks. CIS…
  continue reading
 
Chatting With Red Team Hacker.Assembly/Bash/Python/C# Programmer. 21 Km A Day Cardio. Viking- Leigh Trinity From Newfoundland, Canada- Leigh Trinity said about her work and answered some of my questions. more info at https://smartcherrysthoughts.com
  continue reading
 
Explore the trends in enterprise imaging with Mark Dobbs, Pure's Global Healthcare Alliances Director who specializes in healthcare imaging solutions. Whether you're directly involved in healthcare IT or just interested in the impact in imaging that affects everyone, this is a great listen to see how Cloud, modern architectures, and AI are changing…
  continue reading
 
We've talked about generative AI in a general sense on our podcast for years, but we haven't done many deep dives into specific security use cases. That ends with this interview, as we discuss how generative AI can improve SecOps with Ely Kahn. Some of the use cases are obvious, while others were a complete surprise to me. Check out this episode if…
  continue reading
 
After a recent spike in brute force attempts targeting SSH and VPN services, we felt it was a good time to give listeners a lesson on brute force attacks. Nick Biasini joins host Jon Munshaw this week to discuss the basics of these methods, how administrators can protect their accounts, and other potential defense mechanisms (or whether to just tak…
  continue reading
 
Google postpones third-party cookie deprecation Brocade SAN appliances and switches exposed to hacking ICICI Bank exposes credit cards to wrong users Thanks to this week's episode sponsor, Veracode Don't miss out on this opportunity to elevate your cybersecurity strategy. Build and scale secure software from code to cloud with speed and trust. Visi…
  continue reading
 
Loading …

Quick Reference Guide