show episodes
 
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

Unsubscribe
Unsubscribe
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
HowTo Linux HD

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
The official Odysee channel for the current affairs program hosted by Warren Balogh and Emily Youcis. Support our work with BTC: bc1qsf6k63carpdp9lpymnsc8ukfw7075yh5ddtl8f XMR (Monero): 42WzsvZCEaLTqy5HSCH4KL1eE2W5vCZ9cbSKP45L8o9PDt3yPPaELbAGkBx3wCfGAbK3PRdUjKkaq2eUZ3eyYoB64nUDgDk
  continue reading
 
Artwork

1
The Wildescast

Manhattan Jewish Experience

Unsubscribe
Unsubscribe
Monthly+
 
Jewish education and inspiration courtesy of Rabbi Mark N. Wildes, Founder of the Manhattan Jewish Experience (MJE). Founded in 1998, MJE is a warm and open community where millennial men and women in their 20s/30s can explore Jewish life and meet new people.
  continue reading
 
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
  continue reading
 
Artwork

1
Network Security

University of Twente

Unsubscribe
Unsubscribe
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Weekly podcast on the events, policies and ideas that will shape the world.World in 30 minutes is curated by Mark Leonard, Director of the European Council on Foreign Relations (ECFR), and features top-level speakers from across the EU and beyond to debate and discuss Europe’s role in the world. It was awarded “Best podcasts on EU politics” by PolicyLab in 2019.Member of the EuroPod network. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
The Podcast & Community for Public Sector CIOs & CISOs. Welcome to the The Public Sector Show by TechTables, featuring human-centric stories from C-level technology leaders. Hosted by Joe Toste, you'll gain valuable insights on current issues and challenges faced by top leaders. Through interviews, speaking engagements, and live podcast tour events, we unite public sector CIOs, CTOs, CISOs, and technology leaders in fostering collaboration and meaningful connections in the ever-evolving tech ...
  continue reading
 
Welcome to 'Cloudy with a chance of wireless', the podcast that explores the fascinating world of computer networking, brought to you by Zyxel Networks. Join us as we dive into the intricacies of cloud networking, explore the latest wired, wireless technologies, and discuss the ever-important topic of network security for businesses.Our team of experts, with years of experience in the networking industry, share their insights and knowledge on how these technologies are shaping the future of ...
  continue reading
 
A weekly show hosted by Matt Harris, Head of Content at EM360, exploring the ever-changing world of enterprise tech. Every week a new expert walks us through a different topic in such areas as cybersecurity, data, AI, emerging tech, unified communications, and more!
  continue reading
 
Artwork

1
TechSNAP

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
  continue reading
 
Artwork
 
The Mid-Atlantic’s Best IT services company. Helping Business Owners create, improve and scale their Technology strategy. IT services, IT Security and IT Support advice and leadership from expert professionals. Q&A with Senior Engineers, Service Managers and Business Development.
  continue reading
 
Artwork
 
My name is Ely and I’m a full-time and independent graphic designer. My fiancé is Laura Together, we have discovered that no matter how crazy our work lives can be, there is always laughter in it. Although we have much in common, our differences in pets, music, food, movies, and T.V. shows make for the best conversations.
  continue reading
 
Artwork

1
Breaches & Brews

Rivial Data Security

Unsubscribe
Unsubscribe
Monthly
 
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
  continue reading
 
My Sexy Business Podcast is here to help you create a sexy business for a sexy life through real life examples, interviews and wisdom learned over time. A sexy business is one that you own and it doesn't own you. It attracts customers and clients, it never chases them.
  continue reading
 
Join Ferdi and guests as they discuss hot topics in cybersecurity and share insights, commentary, and advice to help business leaders and IT professionals. Ferdinand Hagethorn heads the cybersecurity practice for global leader in quality engineering, Planit. He is highly experienced in providing executive teams and IT leaders with CISO-level strategies and advice to improve their cybersecurity posture.
  continue reading
 
Loading …
show series
 
In this conversation, Ryan Williams Sr. interviews Miguel Clarke, a retired Supervisory Special Agent from the FBI, now a Cybersecurity and GRC Evangelist, at Armor Defense. Miguel shares his background in law enforcement and his transition into cybersecurity. He discusses the early days of cyber investigations and the collaboration between differe…
  continue reading
 
Is it crazy to believe Biden won't step down and/or that he's not certain to lose to Donald Trump? Or that if he does step down, Kamala Harris is the best (and only plausible) replacement? Chris Coffey, CEO of Tusk Strategies, joins Bradley to offer reasons why the Democrats aren't necessarily facing an historic trainwreck in the fall. Plus, Chris …
  continue reading
 
Ads on the web are beyond annoying – they are actually a threat to your privacy and sometimes even your security. Ads pay for a lot of the “free” web content we consume, but until ad networks stop tracking us and selling ad space to phishing and malware groups, we need tools to block them. Today I’ll give you two solid options for doing so. In the …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/tech-expert-durga-sanagana-advances-next-gen-firewalls-and-threat-modeling-techniques. Durga Prasada Rao Sanagana, the lead cybersecurity architect at a renowned financial organization, is a tech expert stepping up to combat cyber threats. Check more stories related to cyb…
  continue reading
 
In this compelling episode of Truth and Shadow, we sit down with author and speaker Vicki Joy Anderson to delve into the critical role of prayer in spiritual warfare. Vicki shares profound insights on how believers can fortify their hearts against the pervasive influences of the world. Join us as we explore the power of prayer, the importance of sp…
  continue reading
 
Former House Speaker Nancy Pelosi signals the debate over President Biden’s future isn’t over yet. Karen Read’s defense lawyers say a fourth juror has come forward to say that, despite a mistrial, the jury wanted to unanimously acquit her of murder. And NASA insists that two astronauts aren’t “stuck” in space, despite being in orbit for a month. Le…
  continue reading
 
📢 From data privacy norms in the age of AI— tune in to the latest episode of #CryingOutCloud with all you need to know from the cloud security news 🚨 Join Eden Naftali and Amitai Cohen as they dive into:🔍 How a new AI processing cloud service is challenging data privacy norms. 🛡️ The implications of a potential firewall misconfiguration and how to …
  continue reading
 
Recorded at the 2024 Phoenix Live Podcast Tour at GMI on April 1st to 3rd. Ralph Johnson, the State CISO, Washington State brings a wealth of experience to his role as having previously served as CISO for Los Angeles County and Chief Information Security and Privacy Officer for King County. His appointment was strongly endorsed by Bill Kehoe, who p…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/smart-but-depressed-or-dumb-but-happy-the-internets-red-pill-blue-pill-dilemma. Explore the complexities of the internet's darker side, from online gender-based violence and misinformation to the environmental impact of solar panel e-waste. Check more stories related to cy…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/lock-up-your-llms-pulling-the-plug. Protecting sensitive systems such as private LLMs through selective disconnection. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cyber-security, #futur…
  continue reading
 
In his biggest speech of the year, former President Donald Trump veers off-script from what began as a cathartic speech. The Pentagon decommissions its “floating pier” off Gaza’s coast. And an apparent murder involving cyanide-laced tea transfixes Thailand. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
As a founding member of BRICS and a member of the Shanghai Cooperation Organisation, India is a leading middle power. With its strategic geographic and economic position, and historical associations with the nonaligned movement, India cannot be ignored when discussing the world’s rapidly shifting global order. In this episode of ‘The world after th…
  continue reading
 
Oracle CPU; DANE for Exchange Online; VPN Port Shadowing Oracle Quarterly Critical Patch Update https://www.oracle.com/security-alerts/cpujul2024.html Exchange Online Implementing Inbound SMTP DANE with DNSSEC https://techcommunity.microsoft.com/t5/exchange-team-blog/announcing-public-preview-of-inbound-smtp-dane-with-dnssec-for/ba-p/4155257 VPN Po…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-startups-can-bolster-defenses-as-cyber-threats-loom-in-cloud-era. The transition to cloud-based infrastructure and remote work has dramatically expanded the attack surface for cybercriminals. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybe…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/scim-a-critical-yet-underappreciated-element-in-enterprise-iam. Discover how SCIM improves enterprise IAM complementing SSO for automated authentication and authorization. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also …
  continue reading
 
In this episode of the "Truth and Shadow" podcast, host BT delves into the mystical and historical realms of the French Pyrenees with filmmaker Richard Stanley. Stanley shares his experiences living in the region, focusing on the enigmatic histories of the Cathars and Templars. The discussion touches on prophecies, supernatural phenomena, and the c…
  continue reading
 
President Biden is diagnosed with COVID as more senior Democrats reportedly urge him to step aside from the campaign. JD Vance makes his debut as the GOP’s vice presidential nominee, with former President Trump set to speak tonight. And law enforcement sources say the Secret Service spotted the Trump rally gunman on the roof 20 minutes before he fi…
  continue reading
 
Recorded at the 2024 Phoenix Live Podcast Tour at GMI on April 1st to 3rd. Featuring: Ryan Murray, Deputy Director and Chief Information Security Officer, State of Arizona See Ryan's past episodes here: https://podcast.techtables.com/guests/ryan-murray/ Ralph Johnson, Chief Information Security Officer, State of Washington Owen Zorge, Chief Informa…
  continue reading
 
AndroxGh0st; Cisco SSM Vuln; Cisco Email Gateway Vuln; MSFT Checkpoint Updates; GeoServer Patch; Who You Gonna Call: Androx Gh0st Busters! https://isc.sans.edu/diary/Who%20You%20Gonna%20Call%3F%20AndroxGh0st%20Busters!%20%5BGuest%20Diary%5D/31086 Cisco Smart Software Manager Vulnerability CVE-2024-20419 https://sec.cloudapps.cisco.com/security/cent…
  continue reading
 
The podcast discusses a recent article about a Russian troll farm that uses AI-enhanced software to spread disinformation. The hosts highlight the importance of verifying information and diversifying news sources to combat the spread of fake news. They also discuss the need for social media platforms to implement better troll detection and verifica…
  continue reading
 
Sen. Bob Menendez, D-N.J., becomes the first U.S. senator convicted of acting as a foreign agent. President Trump reaches out to Robert F. Kennedy, Jr. during the Republican National Convention. And Democrats are arguing over “virtual convention” rules that could install President Biden as the nominee. Learn more about your ad choices. Visit megaph…
  continue reading
 
Reply Chain Phishing; TP-Link/Synology IP Camera Exploits; Adobe Commerce Exploit; Reply Chain Phishing With a Twist https://isc.sans.edu/diary/%22Reply-chain%20phishing%22%20with%20a%20twist/31084 Claroty TP-Link and Synology IP Camera Exploits https://claroty.com/team82/research/pivoting-from-wan-to-lan-synology-bc500-ip-camera https://claroty.co…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/actionable-threat-intelligence-at-google-scale-meet-google-threat-intelligence-powered-by-gemini. Google Threat Intelligence provides unparalleled visibility into the global threat landscape. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-snowflake-hack-and-its-domino-effect. Learn how to secure your company's data in the wake of major breaches. Discover a four-zone approach to data management that balances security and accessibility Check more stories related to cybersecurity at: https://hackernoon.com…
  continue reading
 
President Trump appears in public for the first time since surviving an assassination attempt, after naming Sen. J.D. Vance as his running mate. In a shocking decision, a federal judge dismisses the federal case against Trump for mishandling classified documents. And historian Allan Lichtman describes what assassination attempts mean for elections.…
  continue reading
 
More than nothing, but not a whole lot more. Bradley analyzes the aftermath of the shooting in Butler, Pa. Plus, riffing from the Times' 100 Best Books of the 21st Century, he compiles his own top ten. This episode was taped at P&T Knitwear at 180 Orchard Street — New York City’s only free podcast recording studio. Send us an email with your though…
  continue reading
 
The conversation discusses a recent article about a new attack on a 30-year-old protocol called RADIUS. The protocol is widely used in networks for client-server interactions, including VPN access, DSL and fiber connections, and 5G authentication. The attack, called Blast Radius, exploits vulnerabilities in the MD5 hash used in the protocol. The at…
  continue reading
 
OOXML Protected Spreadsheets; Leaked PyPi Secret; June MSFT Patch Issues; Protected OOXML Spreadsheets https://isc.sans.edu/diary/Protected%20OOXML%20Spreadsheets/31070 Leaked PyPi Secret Token Revealed in Binary https://jfrog.com/blog/leaked-pypi-secret-token-revealed-in-binary-preventing-suppy-chain-attack/ Microsoft 365 Defender Affected by June…
  continue reading
 
📢 Tune in to Snowflake's Haider Dost for an exclusive session on Securing Databases, Cloud Threat Intelligence, and Detection strategies. The latest podcast episode of #CryingOutCloud is LIVE! Join our special hosts, @Alon Schindel and @Eden, as they dive deep into the world of cloud security with Haider Dost, Head of Global Threat Detection and Th…
  continue reading
 
Loading …

Quick Reference Guide