show episodes
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. The podcast will be released every two weeks - don't miss out and subscribe to be updated as they're live. See acast.com/privacy for privacy and opt-out information.
 
Josh Coats trains some of the top leaders in the network marketing industry, speaks for events and trainings around the country, and runs online courses to help people get results in their biz. He combines high energy with practical truths to help you get over your fears and excuses, and put int he work it takes to get results. Weekly episodes of Your PUSH Coach will include behind the curtain access to live coaching calls, interviews with other top leaders and coaches in the industry, and t ...
 
Frankly IT is the straight-talk podcast for IT leaders who want to boost the performance and efficiency of their technical teams. Tackling everything from service desk and IT project management to tech and business trends that are changing the way you work, we go off the beaten path to bring you interviews, insights, and analysis from worldwide experts and fellow tech leaders who’ve cracked the success code. Featuring practical tips and news you can use, each bi-weekly episode will leave you ...
 
Every Tuesday and Friday, Recode’s Kara Swisher and NYU Professor Scott Galloway offer sharp, unfiltered insights into the biggest stories in tech, business, and politics. They make bold predictions, pick winners and losers, and bicker and banter like no one else. After all, with great power comes great scrutiny. From New York Magazine and the Vox Media Podcast Network.
 
Tech Talk Radio is informed and lively commentary about technology. It is a mix of technology, people, politics, careers, and trends. Tech Talk Radio airs each Saturday from 9 to 10 AM in Washington DC on WFED, which broadcasts at 1500 AM. Tech Talk Radio has been broadcasting weekly since June 2000. Prior to 2007, Tech Talk Radio aired on WMAL (630AM), WJFK (106.7FM), and WTWP (107.7FM/1500AM) radio. Most of the weekly broadcasts are still available at www.techtalkonline.com. This is the mo ...
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
Why isn't talking tech as simple, quick, and agile as its innovations promise to be? Technology Untangled is just that - a show that deciphers tech's rapid evolutions with one simple question in mind: what's really going to shape our future (and what's going to end up in the bargain bin with the floppy disc)? Join your host Michael Bird as he untangles innovation through a series of interviews, stories, and analyses with some of the industry's brightest brains. No marketing speak, no unneces ...
 
We live in a confusing time, bombarded every day with news from around the world that can be hard to follow, or fully understand. Let Worldly be your guide. Every Thursday, senior writer Zack Beauchamp, senior foreign editor Jennifer Williams, and staff defense writer Alex Ward give you the history and context you need to make sense of the moment and navigate the world around you. Produced by Vox and the Vox Media Podcast Network.
 
The Network Transformation Video Podcast Series, hosted by Jim St. Leger, Data Plane Software Product Line Manager at Intel, tackles some of the most pressing challenges and opportunities in transforming the network. Through a series of eight videos, we will cover business transformation, telco cloud, use cases, open source, packet processing, 5G, containers and network security. Tune in to find out how your business can benefit from network transformation. Learn more at http://intel.ly/2cDD1aN.
 
Hello! This is The Vergecast, the flagship podcast of The Verge... and your life. Every Friday, Nilay Patel and Dieter Bohn make sense of the week's tech news with help from our wide-ranging staff. And on Tuesdays, Nilay hosts in-depth, one-on-one interviews with major technology leaders. Join us every week for a fun, deeply nerdy, often off-the-rails conversation about what's happening now (and next) in technology and gadgets.
 
Jump-start your use of the Cisco Learning Network's dynamic features and vibrant community offerings. Here you will find technical information and professional networking opportunities, which will help advance your certification goals. By joining the Cisco Learning Network you will be a part of the community, prepare for success, interact with professionals, mentor, share, and achieve.
 
Digital-first has replaced digital transformation as the imperative for organizations to align technology investments with business goals. It is crucial for every business to respond quickly and adapt, and to become more resilient, more flexible and more prepared to drive recovery and growth in the face of inevitable future challenges. This is what VMware call being Future Ready. Provocative, compelling and above all, useful conversation from VMware. Get the very latest insights from leading ...
 
Network Collective is a community-focused network engineering video podcast. Our episodes bring knowledge and insights of industry experts, pioneers, and peers to wherever you are. Topics range from protocol deep-dives to career management, but through a lens of what is relevant and valuable today. We get engineering because we are engineers. You can find all of our content at our website: https://thenetworkcollective.com
 
We bring the experts to you! Through our podcast series, the IEEE Future Networks Initiative interviews some of the top subject matter experts in the 5G field. Covering many topics including implementation challenges and connecting the disconnected, IEEE Future Networks Transmissions: Podcasts with the Experts provides you with access to the industry's top subject matter experts.
 
Whistleblowing Now and Then is cohosted by Anna Myers, Executive Director of WIN and Vigjilenca Abazi, Assistant Professor of European Law at Maastricht University. Join Whistleblowing Now and Then to hear about the most important issues of the day for whistleblowing, featuring interviews with experts, whistleblowers and advocates from around the world. Whistleblowing Now and Then is produced by Christopher Atkinson, Communications Assistant, WIN. The theme music is by the Routes Quartet and ...
 
Black Men Can't Jump [In Hollywood] is a comedic podcast that reviews films with leading actors of color and analyzes them in the context of race and Hollywood's diversity issues. Hosted by Jonathan Braylock, Jerah Milligan, and James III. BMCJ is an iTunes Editor's Choice podcast and has reached #2 on the iTunes Film/TV charts. BMCJ has also been covered by multiple websites including Huffington Post, Splitsider, Salon, The Daily Dot, and more. Produced by the Forever Dog Podcast Network.
 
Intel is helping to transform network services with software defined capabilities that enable fast service deployment and more revenue opportunity for the enterprise, cloud, and telecommunications infrastructures. The explosion of global network traffic driven by consumer demand for mobile, rich content anytime, anywhere, and the need to rapidly introduce new revenue generating services is driving IT managers, Telco, and cloud service providers (CSPs) to carefully scrutinize future network c ...
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
 
Loading …
show series
 
Securing Exchange Online https://isc.sans.edu/forums/diary/Securing+Exchange+Online+Guest+Diary/26600/ Decoding Corrupt BASE64 https://isc.sans.edu/forums/diary/Decoding+Corrupt+BASE64+Strings/26606/ Fortinet VPN Default Setting Problem https://securingsam.com/breaching-the-fort/ Single Use Credit Cards Numbers https://www.helpnetsecurity.com/2020/…
 
Welcome! Craig discusses problems that businesses can face when remote workers have IoT devices on the network they use to connect to work. For more tech tips, news, and updates, visit - CraigPeterson.com --- Read More: Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities Ransomware accounted for 41% of all cyber insurance claims…
 
Security is a difficult discipline to master. It requires experts to continuously challenge themselves and learn new tools and technologies to protect their organizations. In this episode, Mike Spanbauer, Technology Evangelist at Juniper, will discuss some ways to build a threat-aware network. Discover a new way to think about your approach to secu…
 
Summary Servers and services that have any exposure to the public internet are under a constant barrage of attacks. Network security engineers are tasked with discovering and addressing any potential breaches to their systems, which is a never-ending task as attackers continually evolve their tactics. In order to gain better visibility into complex…
 
Yay! It's time for another tale of pentest pwnage! Highlights include: Making sure you take multiple rounds of "dumps" to get all the delicious local admin creds. Why lsassy is my new best friend. I gave a try to using a Ubuntu box instead of Kali as my attacking system for this test. I had pretty good results. Here's my script to quickly give Ubun…
 
We can all agree that Hybrid Networks are here to stay, however it isn’t just working from home…. its remote workers operating wherever they are. Home, the lake house, the coffee shop or the inlaws…our perimeters continue to expand as Covid forces this new paradigm shift. Brian talks with Jason Norton, Product Marketing Director with VIPRE, Travis …
 
ZNDP 056 – Business Priority: Pervasive Security! Pervasive Security: What are Business Priorities? Pervasive Security as a Business Priority! What is a Business Priority and why do you need to know about it? That’s what we are going to cover today! I’m going to explain it. Then I will highlight one example priority to provide some real-world conte…
 
While Jerah is busy moving, James and Jonathan return to Quarantine City to discuss AppleTV's 2020 biopic "The Banker" starring Anthony Mackie, Samuel L. Jackson, Nia Long, and Nicholas Hoult VOTE! Verify that you're registered and make a plan to vote on or before November 3rd 2020. Find voting resources here: https://foreverdogpodcasts.com/vote TH…
 
In episode 140 for September 28th 2020: Details on the first human death related to a ransomware attack, popular fitness app Strava is caught giving away your location data to strangers, and the top privacy improvements in Apple iOS 14. ** Links mentioned on the show ** A Patient Dies After Ransomware Attack Paralyzes German […] The post Death by R…
 
Director of security operations at Syntax Richard Torres talks about his path leading him working in juvenile justice to becoming a private investigator to physical security at a nuclear power plant to cybersecurity presently. Always a fan of police shows, Richard became a member of the Air Force Junior ROTC in high school and began his path there.…
 
Throughout March and April, QuoIntelligence (QuoINT) observed four attacks (i.e. sightings) utilizing various tools from the Golden Chickens (GC) Malware-as-a-Service (MaaS) portfolio – they recently declassified their findings, after first notifying their clients. Further, during their analysis of the sightings, QuoIntelligence confirmed the GC Ma…
 
Welcome! Craig discusses problems related to Mail-in Voting and Voting technology. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities Ransomware accounted for 41% of all cyber insurance claims in H1 2020 A bevy of new features make iOS 14 the most se…
 
Welcome! Craig discusses the mounting security issues revolving around the upcoming elections. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities Ransomware accounted for 41% of all cyber insurance claims in H1 2020 A bevy of new features make iOS 14…
 
Welcome! Craig discusses problems with some of the smart lock technology and an even larger issue surrounding IoT devices in general. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities Ransomware accounted for 41% of all cyber insurance claims in H1 …
 
Welcome! Craig discusses how Police are using Facial Recognition to identify and trace movements of rioters. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities Ransomware accounted for 41% of all cyber insurance claims in H1 2020 A bevy of new featur…
 
Welcome! Craig discusses the Hawthorne Effect and the changing business office. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities Ransomware accounted for 41% of all cyber insurance claims in H1 2020 A bevy of new features make iOS 14 the most secur…
 
Welcome! Craig discusses how a kid on a zoom virtual learning meeting caused his parents to be questioned by Police. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities Ransomware accounted for 41% of all cyber insurance claims in H1 2020 A bevy of ne…
 
Welcome! Craig discusses a hack at Uber that ended up with its Chief of Security facing Obstruction of Justice charges. For more tech tips, news, and updates visit - CraigPeterson.com --- Read More: Patch Tuesday (September 2020): Microsoft Addresses 129 Vulnerabilities Ransomware accounted for 41% of all cyber insurance claims in H1 2020 A bevy of…
 
Nilay, Dieter, and Dan discuss all the important announcements from Amazon's fall hardware event this week, from a security drone for your home to a new cloud gaming service. Stories discussed this week: CDC removes guidance about airborne spread of the coronavirus Averting a COVID-19 vaccination crisis will take careful communication Ring’s latest…
 
Facebook takes down three Russian networks for coordinated inauthenticity: a lot of activity but not much evident ROI. Russia calls for confidence-building measures in cyberspace. CISA detects a successful incursion into an unnamed Federal agency. Governments warn of heightened rates of cyberattacks against medical organizations. Mike Benjamin from…
 
Customer Experience as a Business Priority – ZNDP 059! Customer Experience: What are Business Priorities? What is Customer Experience and why is it a Business Priority? That’s what we are going to cover today! I’m going to explain it. Then I will highlight one example priority to provide some real-world context! Today we will be highlighting Custom…
 
Kara and Scott talk about Tesla's "Battery Day" and California Governor Gavin Newsom saying his state with be gas-vehicle free by 2035. They also discuss the DOJ's plan to bring an antitrust lawsuit against Google. Plus Kara and Scott consider how Democrats and Republicans may look at data privacy issues differently after the election. Scott has a …
 
Good morning everybody! I was on WGAN this morning with Matt Gagnon, and we began talking about Deep Fakes and then went right into China's theft of US Intellectual Property. Let's get into my conversation with Matt on WGAN. These and more tech tips, news, and updates just visit - CraigPeterson.com --- Automated Machine Generated Transcript: Craig …
 
James, Jerah, and Jonathan take a short break to check in with each other and chat with Haesue Jo, a licensed therapist and clinical support lead at Betterhelp. THIS EPISODE IS SPONSORED BY BETTERHELP For 10% off, visit https://www.betterhelp.com/jump Listen to Black Men Can't Jump [In Hollywood] Ad-Free on Forever Dog Plus: http://foreverdogpodcas…
 
Party in Ibiza with PowerShell https://isc.sans.edu/forums/diary/Party+in+Ibiza+with+PowerShell/26594/ Microsoft Tracking Zerologon Exploits https://twitter.com/MsftSecIntel/status/1308941504707063808 Apple Patches https://support.apple.com/en-us/HT201222 Instagram for Android Vulnerability https://blog.checkpoint.com/2020/09/24/instahack-how-resea…
 
MapableUSA.com: One of the greatest aspects of Regulation A+ crowdfunding is that it provides issuers with a legitimate path to access the capital markets. But going public and staying public is expensive, and many times these businesses find themselves in desperate need of capital. They then become prey to toxic lenders who many times end up pushi…
 
Zerologon is being actively exploited in the wild. The OldGremlin ransomware gang picks on Russian targets. Thought Fancy Bear was done with NATO? (Think again.) The US Treasury Department sanctions more organizations and individuals for malign influence operations. Betsy Carmelite from BAH on vaccine laboratory cybersecurity. Our guest is Shena Th…
 
Zack, Jenn, and Alex break down the “peace deals” between Israel and two Gulf states, the United Arab Emirates and Bahrain. They explain what’s in the agreements, how they happened, and why Trump is using the agreements to sell himself as a peacemaker. Then they zoom out and explain what the agreements tell us about Middle Eastern geopolitics — and…
 
Brian has an eye opening round table discussion with IoTSSA Contributor, Ryan Morris, Principal Consultant with Morris Management Partners. IoTSSA Advisory Board Members, Brian Weiss, CEO of ITech Solutions and Jason Tierney, Partner at C3 Integrated Solutions about sales opportunities and challenges in todays business environment. New opportunitie…
 
What happens when biometric information is compromised? For too many lawyers, the risks associated with this technology have been flying under the radar, but that needs to change! Digital Detectives hosts John and Sharon welcome Judy Selby to discuss the full spectrum of what lawyers should know about biometric technology. They address its many use…
 
Dynamic Malicious Word Document https://isc.sans.edu/forums/diary/Malicious+Word+Document+with+Dynamic+Content/26590/ Old Versions of SAMBA Affected by ZeroLogon Vulnerability https://www.samba.org/samba/security/CVE-2020-1472.html Google Chrome Update https://chromereleases.googleblog.com/2020/09/stable-channel-update-for-desktop_21.html QNAP Devi…
 
*ALL TOPICS DISCUSSED ARE FOR INFORMATIONAL AND EDUCATIONAL PURPOSES ONLY AND NOT TO BE CONSIDERED OR CONSTRUED AS LEGAL ADVICE* Welcome to the FOUNDATION! [The] FOUNDATION - The Public Is Locking Down! PRIVATE MONEY IS PUBLIC MONEY! This May Be A Very Controversial Show... "Sot, what happened to the show from last week?l" We Are Living In Crazy Ti…
 
Hi! Today our pal Joe "The Machine" Skeen (a.k.a. Gh0sthax has prepared some cyber-licious actionable news stories for us to chew on. Today's stories include: Cybersecurity skills gap (powered by lack of career development!) Which cyber jobs are hot - or not? Mysterious wave of DDoS attacks The Magecart threat group pwns thousands of ecommerce site…
 
Facebook takes down coordinated inauthenticity. A ransomware-involved death is attributed to DoppelPaymer. CISA and the FBI warn of coming election disinformation. LokiBot is back in a big way. Operation DisrupTor collars a hundred-seventy Darknet contraband merchants. Joe Carrigan comments on the botched ransomware attack in Germany that led to a …
 
The need for strong cybersecurity is ever present, but the needs of specific organizations – and the challenges they face – vary. State & local government agencies are responsible for a wide variety of essential services and data. And that makes finding the right fit for securing their networks against online threats complicated. We welcome Fortine…
 
Citrix ADC Udpates https://support.citrix.com/article/CTX281474 Firefox Version 81 Released https://www.mozilla.org/en-US/firefox/81.0/releasenotes/ Simple Scan Drops Ransomware Risk https://www.accesswire.com/607018/Corvus-Updates-Scan-Technology-with-RDP-Detection-Slashes-Ransomware-Claims-by-65 iOS 14 Jailbreak https://checkra.in/news/2020/09/iO…
 
Loading …

Quick Reference Guide

Copyright 2020 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login