All you need to know about zero trust and digital transformation, from change management best practices to network and cybersecurity modernization and everything in between. Expect fresh stories, new insights, and the latest developments from pioneers on the leading edge of technology.
…
continue reading
Enterprise networking isn’t boring. This stuff is real life, from the retail store of the future to the latest public safety technologies. We chop it up with experts from around the globe and various industries — leaving no stone unturned in a mutual quest for the securest, most reliable network possible. SD-WAN and 5G. SASE and zero trust. Stories from the data center to the most far-flung IoT deployments imaginable. (Podcast brought to you by Cradlepoint, part of Ericsson.) cradlepoint.com
…
continue reading
i live in the ministry of sounds the ministry of live
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Join MEF CTO Pascal Menezes as he explores thought-provoking perspectives from the leaders and changemakers propelling enterprise digital transformation forward. Each episode delves into leading-edge business insights from top network, cloud, and technology executives and industry analysts—leaving you with key takeaways to help grow your revenue and bring services and solutions to market faster. Executives at the Edge explores topics such as: What is SD-WAN and SASE and what does market grow ...
…
continue reading
Listen, Learn, Leverage! This Palo Alto Networks podcast offers insights to help you build knowledge, maximize investment, and improve your company’s cybersecurity posture.
…
continue reading
Techie & the Biz is a podcast series that explains and simplifies business technology, how it’s changing and how it can help your organization. Hosts Max and Erika Silber discuss with experts a wide range of business technologies from Microsoft Teams and Mobile tech to AI, IoT, SD-WAN and SASE network security – in a (mostly) serious manner (except when it’s not) befitting a business podcast (to real people).
…
continue reading
The Imaginal Podcast is for anyone who wants to break through old criticisms or move through childhood feelings of exclusion in order to express themselves more fully. Sometimes old stories or fears can unnecessarily hold really capable, talented people back. We are often creatives and empaths - people who are generally self-aware yet also have areas of their life that they still want to express whether that's creatively, professionally, relationally or contributorily. It is a place where we ...
…
continue reading
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
…
continue reading
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The experience era is upon us. Get news, insights, and opinions on the latest disruptions in CX, digital experience (DX), and the business of experience (BX) to expand your mindset about leadership in this new economy.
…
continue reading
Convergence by Cato Networks is a show for IT professionals made by IT professionals. We'll talk about the most burning questions, hear bolder opinions and mostly learn about what is happening in the IT world today
…
continue reading
Podcast by Cisco
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
IT in the Bay podcast is bringing you causal enterprise IT conversations about networking, security and collaboration.
…
continue reading
Enjoy this encore episode. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
1
Exploring Unified SASE as a Service - Renuka Nadkarni - ESW #380
30:27
30:27
Play later
Play later
Lists
Like
Liked
30:27
Implementing SASE can be tricky and onerous, but it doesn't have to be. Today, we discuss Unified SASE as a Service with Renuka Nadkarni, Chief Product Officer at Aryaka. Particularly, how can Unified SASE make both networking and security more flexible and agile? IT and security professionals need to ensure secure and performant applications and d…
…
continue reading
1
Software-Defined Software and Zero-Trust Networks
15:10
15:10
Play later
Play later
Lists
Like
Liked
15:10
TBDBy sdntechforum
…
continue reading
1
Proactive Cybersecurity in Healthcare with Joe Gellatly #inch360'24
11:37
11:37
Play later
Play later
Lists
Like
Liked
11:37
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, Jethro Jones welcomes Joe Gellatly, founding partner of Medcurity. Joe discusses the importance of cybersecurity in healthcare, how Med…
…
continue reading
1
$200M for IoT security, 4 acquisitions, fake job openings, vapes are trash - ESW #383
54:50
54:50
Play later
Play later
Lists
Like
Liked
54:50
In the enterprise security news, Some big fundings no less than 4 acquisitions Silencing the EDR silencers ghost jobs overinflated estimates on open cybersecurity jobs weaponizing Microsoft Copilot fun projects with disposable vapes All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-383…
…
continue reading
1
The State of DSPM, One of the Hottest New Cybersecurity Markets in Years - Todd Thiemann - ESW #383
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18
Is it a product or a feature? Is it DLP 4.0, or something legitimately new? Buy now, or wait for further consolidation? There are SO many questions about this market. It's undeniably important - data hygiene and governance continues to be a frustrating mess in many organizations, but is this the solution? We'll discuss with Todd to find out. Show N…
…
continue reading
1
Robo-Turing, BlueNoroff, Palo Alto, German Law, Fabric, Cisco, Bans, Aaran Leyland... - SWN #429
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39
Robo-Turing, BlueNoroff, Palo Alto, German Law, Fabric, Cisco, Banning Things, Aaran Leyland, and More, on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-429
…
continue reading
1
Cybersecurity Budgets: the Journey from Reactive to Proactive - Theresa Lanowitz - ESW #383
32:53
32:53
Play later
Play later
Lists
Like
Liked
32:53
CISOs struggle more with reactive budgets than CIOs or CTOs. It's not that part of the CISO's budget shouldn't be reactive, it's certainly necessary to an extent. The problem is when proactive measures suffer as a result. In this interview, we'll discuss some of the causes behind this and some strategies for breaking out of this loop. This segment …
…
continue reading
1
We're Not Saying "I told you so" - PSW #850
2:01:51
2:01:51
Play later
Play later
Lists
Like
Liked
2:01:51
In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard for no PoC, an LLM that discovers software vulnerabilities, absurd fines, long usernames and Okta, and paying a ransom with dough! Show Notes: https://securityweekly.com…
…
continue reading
1
Cybersecurity For Schools - Kayne McGladrey - PSW #850
45:59
45:59
Play later
Play later
Lists
Like
Liked
45:59
We chatted with Kayne about education systems security, funding for cyber tools and services, and what the future of education might look like to fill more cyber roles. Show Notes: https://securityweekly.com/psw-850
…
continue reading
This special “Power Play” episode recaps insights on the transformative impact of Network-as-a-Service, emphasizing flexibility, automation, and cloud-inspired models. Expert analysts from Frost & Sullivan, AvidThink, and Dell’Oro Group weigh in on the dynamic, scalable nature of NaaS, and its alignment with enterprises’ growing preference for cons…
…
continue reading
1
Tariffs, Pygmy Goat, Schneider, SQLite, Deepfakes, Military AI, Josh Marpet... - SWN #428
32:53
32:53
Play later
Play later
Lists
Like
Liked
32:53
Tariffs, Pygmy Goat, Schneider, SQLite and Dixie Flatline, Deepfakes, Military AI, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-428
…
continue reading
1
Total Recall? LLM finds bug in SQLite, C++ safety failures, zero time for zero privs - ASW #306
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29
Microsoft delays Recall AGAIN, Project Zero uses an LLM to find a bugger underflow in SQLite, the scourge of infostealer malware, zero standing privileges is easy if you have unlimited time (but no one does), reverse engineering Nintendo's Alarmo and RedBox's... boxes. Bonus: the book series mentioned in this episode The Lost Fleet by Jack Campbell…
…
continue reading
1
The Right CISO, with a New Security Leadership Style, to Safeguard Your Business - BSW #371
26:57
26:57
Play later
Play later
Lists
Like
Liked
26:57
In the leadership and communications segment, How to Find the Right CISO, New Security Leadership Style Needed for Stressed Workers, Combatting Human Error: How To Safeguard Your Business Against Costly Data Breaches, and more! Show Notes: https://securityweekly.com/bsw-371
…
continue reading
1
Today's Hybrid Work Era: Integrated Approach & Implementing Identity - ESW #382
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38
Today’s cyber threat actors are capitalizing on organizations’ identity vulnerabilities, such as MFA. Nearly 75% of cloud security failures now result from mismanaged identities, access, and privileges, and the identity attack surface is becoming more challenging to protect as companies expand their cloud environments and supply chains to meet thei…
…
continue reading
1
Bug bounties, vulnerability disclosure, PTaaS, fractional pentesting - Grant McCracken - ASW #306
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
…
continue reading
1
Planning A Merger Or Acquisition? Ask These Five Cyber Questions First - Craig Davies - BSW #371
38:23
38:23
Play later
Play later
Lists
Like
Liked
38:23
Merger and acquisition (M&A) activity in finally starting to pick up. Although the allure of financial gains and market expansion drives these deals, the digital age demands a rigorous assessment of cybersecurity risks accompanying such mergers. Unanticipated cyber issues, like dormant malware or inconsistent access controls, can transform an ideal…
…
continue reading
Enjoy this encore episode. The practice of emulating known adversary behavior against an organization's actual defensive posture. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy N2K Networks
…
continue reading
1
Funding, AI controls your PC, Cyberstarts stops Sunrise, public cyber goes private - ESW #382
1:04:31
1:04:31
Play later
Play later
Lists
Like
Liked
1:04:31
This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts’ sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enter…
…
continue reading
1
Recall, Russia, Win 10, Phish n Ships, Midnight Blizzard, Rob Allen, and More... - SWN #427
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50
Recall III: the Re-Re-Recalling, Russia, Win 10, Phish n Ships, Midnight Blizzard, Emerald Whale, Rob Allen, and More, on this edition of the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/unitedhealth-says-data-of-100-million-stolen-in-change-healthcare-breach/ This segment is sponsored by ThreatLocker. Vis…
…
continue reading
1
What if securing buildings was as easy as your smartphone? - Blaine Frederick - ESW #382
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to …
…
continue reading
1
Software Defined Network - My learnings from real world deployments
10:08
10:08
Play later
Play later
Lists
Like
Liked
10:08
Join us on the SDN Tech Networking Podcast, the world's first human-curated AI podcast, where we break down complex topics into bite-sized, easy-to-digest pieces. In this episode, we dive into Software Defined Networking (SDN) and explore how it's shaking up enterprise networks. Learn about the basics of SDN, its benefits, and why it's crucial for …
…
continue reading
1
EDR Is Dead, EDR Is Not Dead - PSW #849
1:50:52
1:50:52
Play later
Play later
Lists
Like
Liked
1:50:52
Google's cookie encryption drama, Microsoft accusing Google of shady antitrust tactics, AI shenanigans, the rejected Defcon talk and hacking traffic lights, vulnerabilities in Realtek SD card readers, the never-ending debate on quantum computing vs. cryptography, backdoors are not secrets and where we are pushing attackers, firmware leakage, more o…
…
continue reading
1
Halloween, TikTok, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more... - SWN #426
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50
Halloween, TikTok Rip Off, Telcos, Win 11, Five Eyes, AWS, France, ChatGPT, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-426
…
continue reading
1
Shadow IT and Security Debt - Dave Lewis - PSW #849
59:44
59:44
Play later
Play later
Lists
Like
Liked
59:44
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
…
continue reading
1
Protecting Identity of AI Agents & Standardizing Identity Security for SaaS Apps - Shiven Ramji, Arnab Bose - ASW #305
30:42
30:42
Play later
Play later
Lists
Like
Liked
30:42
Generative AI has been the talk of the technology industry for the past 18+ months. Companies are seeing its value, so generative AI budgets are growing. With more and more AI agents expected in the coming years, it’s essential that we are securing how consumers interact with generative AI agents and how developers build AI agents into their apps. …
…
continue reading
1
Making TLS More Secure, Lessons from IPv6, LLMs Finding Vulns - ASW #305
53:04
53:04
Play later
Play later
Lists
Like
Liked
53:04
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Show Notes: https://securityweek…
…
continue reading
1
Stay Ahead of Identity Threats & Addressing Cybersecurity Disparities - David Bradbury, Erin Baudo Felter - BSW #370
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10
Identity continues to be one of the most used attack vectors by cybercriminals. From phishing to credential stuffing to password spraying – threat actors are finding new ways to infiltrate systems and cause costly problems to companies. David Bradbury, Chief Security Officer at Okta, joins Security Weekly's Mandy Logan to discuss today's threat lan…
…
continue reading
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
…
continue reading