show episodes
 
Late night transmissions of industrial/post-industrial, EBM, power electronics, synthpunk, coldwave/minimal wave, no wave and noise rock, darkwave, dark ambient, the experimental sounds of inner and outer space and more. Airs Sundays at 10 PM-1 AM CT on KUHS-LP 102.5 FM and at kuhsradio.org.
  continue reading
 
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

Unsubscribe
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

Unsubscribe
Unsubscribe
Monthly+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Artwork

1
Tech Bytes

Packet Pushers

Unsubscribe
Unsubscribe
Monthly+
 
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Greg Ferro, Ethan Banks and Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. O ...
  continue reading
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

Unsubscribe
Unsubscribe
Monthly
 
The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join John Vecchi as he speaks with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought leaders, to give you the information you need to navigate security a ...
  continue reading
 
Artwork

1
Security Cocktail Hour

Joe Patti and Adam Roth

Unsubscribe
Unsubscribe
Monthly+
 
Security veterans Joe Patti and Adam Roth share cyber security insights from their virtual bar stools. Join Joe and Adam, along with a diverse lineup of industry insiders, for a view into how the professionals see the security issues that impact all of us. Tune in for engaging discussions, expert analyses, and a behind-the-scenes look into the cybersecurity world. Video on Spotify and YouTube; audio on all other podcasting platforms. Reach us at feedback@securitycocktailhour.com or @SecCockt ...
  continue reading
 
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
  continue reading
 
Loading …
show series
 
The resources available at small utilities are scarce, and that’s a big problem because small water, gas, and electric facilities are increasingly under attack. Dawn Capelli of Dragos is the Director of OT-CERT, an independent organization that provides free resources to educate and even protect small and medium sized utilities from attack.…
  continue reading
 
Today on the Tech Bytes podcast we talk OpenConfig and data models with sponsor Nokia. Nokia’s SR Linux network OS has embraced OpenConfig to help you support automation initiatives. We talk with Nokia about why it chose OpenConfig, how it handles mixed data models for device platforms that may or may not use OpenConfig, and... Read more »…
  continue reading
 
On today’s show we talk about designing a network to support hybrid cloud deployments. That is, building and operating a network to interconnect the Big Three US public clouds (GCP, AWS, and Azure) as well as on-prem infrastructure to support a variety of applications and workloads. The network design had to meet several requirements, including... …
  continue reading
 
People often take a non-traditional path into the field of information security, and Nathali Cano’s journey is one of the most unique we’ve ever encountered. How she became “a social worker that happens to be a cybersecurity engineer” is a fascinating story of a single mom making opportunities for herself out of nothing but hard work and determinat…
  continue reading
 
Today on the Tech Bytes podcast we discuss vulnerability management for IoT and OTT devices with sponsor Palo Alto Networks. These devices–think video cameras, sensors, medical equipment, industrial control systems, and so on–present unique challenges when it comes to finding, prioritizing, and managing software vulnerabilities. Palo Alto Networks’…
  continue reading
 
For the last twenty years we’ve invested in software security without parallel development in firmware security. Why is that? Tom Pace, co-founder and CEO of NetRise, returns to Error Code to discuss the need for firmware software bills of materials, and why Zero Trust is a great idea yet so poorly implemented. As in Episode 30, Tom is a straight s…
  continue reading
 
In this interview at SINCON 2024, Dr. Joshua James, a Regional Counter Cyber Crime Coordinator for the United Nations Office on Drugs and Crime (UNODC), shared his insights on the Regional Counter-cybercrime programme at UNODC. Dr. James argued that while law enforcement agencies are getting better at responding to cybercrime, the cyber criminals a…
  continue reading
 
Ready to take a trip back to the 1980’s and learn some networking history? We talk with Alan Kirby, who was there forty years ago when the first Ethernet bridge was created at Digital Equipment Corporation (DEC). He explains the story of why and how it came to be. We discuss how Ethernet compared to... Read more »…
  continue reading
 
When you lead an information security organization, you get asked one question constantly: Are we secure? Veteran Chief Information Security Officer (CISO) DouglasMarzano joins us to discuss how to answer this seemingly simple question, which cuts to the core of the security leader’s job of managing perceptions and expectations. Whether you’re a ‘c…
  continue reading
 
Today on the Tech Bytes podcast we talk with Jonathan Symonds, Chief Marketing Officer at MinIO about MinIO’s object storage offering; a software-defined, Amazon S3-compatible object storage that offers high performance and scale for modern workloads and AI/ML. We discuss how MinIO helps customers across industries drive AI innovation and AI archit…
  continue reading
 
That camera above your head might not seem like a good foreign target, yet in the Ukraine there’s evidence of Russian-backed hackers passively counting the number of foreign aid workers at the local train stations. Andrew Hural of UnderDefense talks about the need to secure everything around a person, everything around an organization, and everythi…
  continue reading
 
The rise of SASE has eclipsed SD-WAN as organizations develop strategies and analyze products for secure access. But SD-WAN is an essential component of SASE; in fact, sponsor Palo Alto Networks says SD-WAN is the most important component. On today’s Tech Bytes podcast we talk with Palo Alto Networks about why SD-WAN underpins a SASE... Read more »…
  continue reading
 
When you think of IETF, you probably just think of defining protocols, but its new NMOP working group is all about helping network operators identify issues and deploy solutions, including those that pop up around automation. Mahesh Jethanandani is an Area Director (AD) for Management in IETF, which oversees the NMOP WG, and joins the... Read more …
  continue reading
 
Your digital identity is more than just your username and password. In fact, as AI continues to evolve, how we define identity online is changing, and so is how we prove who we are. In this episode, we delve into the future of digital identity with Venkat Raghavan, the CEO of Stack Identity and a seasoned expert in the field. Venkat breaks down the…
  continue reading
 
Today on the Tech Bytes podcast, sponsored by Nokia, we hear from Nokia customer NL-IX. NL-IX is a leading Internet Exchange based in the Netherlands. The organization recently redesigned and upgraded its network. Nokia played a role in that upgrade, including 400 and 800G routers and FP5 silicon. We’re joined by Dirk Kalkman, Chief Network... Read…
  continue reading
 
High Frequency Trading in finance demands the utmost quality and speed from a network, making flawless observability a must. Our guest today is Radu Ionco from Jump Trading, and he tells us about how they built their own custom network observability platform, even creating a monitoring system for the monitoring system. We talk through streaming... …
  continue reading
 
In this interview, we speak with Mac Munsayac, Head of Customer Experience at Philippine Airlines, to explore the transformative role of AI in the aviation industry. Mac elaborates on the integration of generative AI and tools to enhance customer interactions by providing personalized, proactive, and frictionless experiences, especially in scenario…
  continue reading
 
A critical skills gap in Operational Technology security could have a real effect on your water supply and other areas of the critical infrastructures. Christopher Walcutt from DirectDefense explains how the IT OT convergence, and the lack of understanding of what OT systems are, might be contributing to the spate of water systems attacks in 2024.…
  continue reading
 
When it comes to SSE, it’s helpful to know the vendor’s history and approach to understand if it’s the best fit for your organization. HPE Aruba’s SSE journey started when it acquired Axis Security, a company focused on solving the problem of third party access. Because of that focus, HPE Aruba says its SSE is... Read more »…
  continue reading
 
As Vice President and CTO, Solutions, for Salesforce ASEAN, Gavin Barfield leads a team of Salesforce engineers across the region to develop and drive integrated technology solutions for Salesforce customers. Gavin works closely with customers in ASEAN on their digital transformations, bringing together the full value of the Salesforce platform to …
  continue reading
 
Fortinet’s Unified SASE provides consistent security controls and policies both for traditional campuses and the hybrid workforce.. Nirav Shah joins us to explain how Fortinet is positioned to do this: a foundational software developed for 20 years, a network of over 140 POPs, a security lab with over 1,000 researchers, continuous ZTNA verification…
  continue reading
 
We usually talk about information technology, but the real world runs on power, water and factories – and protecting them from attack is a whole different ballgame. Robert Lee, CEO of Dragos, gives us a fascinating introduction to Operational Technology (OT) cyber security. Listen in to learn about how Robert and colleagues secure the infrastructur…
  continue reading
 
When a network for a new location needs to come online, networkers are faced with a predictable (and painful) to-do list: deal with ISPs, design and implement floor plans, obtain hardware, configure devices, etc. Meter’s Network-as-a-Service (NaaS) is here to take care of all that for you. Meter’s CEO Anil Varanasi joins the show to... Read more »…
  continue reading
 
Greg Ferro, co-founder of Packet Pushers, is signing off. After years of frustrating health issues, he’s decided to fully step back from podcasting and industry analysis to take care of himself. After 14 years, today is his last appearance on Heavy Networking. In this parting episode, Greg shares his final dose of incisive insights and... Read more…
  continue reading
 
UK will propose law to ban ransom payments for critical infrastructure entities. EPA outlines enforcement measures to protect water utilities against cyberattacks. Rockwell advises customers to disconnect ICS devices from the internet. Senator Vance asks CISA for information on Volt Typhoon. Guest Kimberly Graham of Dragos joins Dave to discuss reg…
  continue reading
 
When critical infrastructure is shut down due to ransomware or some other malicious attack, who gets notified and when? Chris Warner, from GuidePoint Security, discusses the upcoming Cyber Incident Reporting for Critical Infrastructure Act or CIRCIA and what it will mean for critical infrastructure organizations.…
  continue reading
 
Loading …

Quick Reference Guide