show episodes
 
Artwork

1
CXO Voices

CXO REvolutionaries

Unsubscribe
Unsubscribe
Daily+
 
All you need to know about zero trust and digital transformation, from change management best practices to network and cybersecurity modernization and everything in between. Expect fresh stories, new insights, and the latest developments from pioneers on the leading edge of technology.
  continue reading
 
Enterprise networking isn’t boring. This stuff is real life, from the retail store of the future to the latest public safety technologies. We chop it up with experts from around the globe and various industries — leaving no stone unturned in a mutual quest for the securest, most reliable network possible. SD-WAN and 5G. SASE and zero trust. Stories from the data center to the most far-flung IoT deployments imaginable. (Podcast brought to you by Cradlepoint, part of Ericsson.) cradlepoint.com
  continue reading
 
Join MEF CTO Pascal Menezes as he explores thought-provoking perspectives from the leaders and changemakers propelling enterprise digital transformation forward. Each episode delves into leading-edge business insights from top network, cloud, and technology executives and industry analysts—leaving you with key takeaways to help grow your revenue and bring services and solutions to market faster. Executives at the Edge explores topics such as: What is SD-WAN and SASE and what does market grow ...
  continue reading
 
Artwork

1
PANCast™

Palo Alto Networks - LIVEcommunity

Unsubscribe
Unsubscribe
Monthly
 
Listen, Learn, Leverage! This Palo Alto Networks podcast offers insights to help you build knowledge, maximize investment, and improve your company’s cybersecurity posture.
  continue reading
 
Techie & the Biz is a podcast series that explains and simplifies business technology, how it’s changing and how it can help your organization. Hosts Max and Erika Silber discuss with experts a wide range of business technologies from Microsoft Teams and Mobile tech to AI, IoT, SD-WAN and SASE network security – in a (mostly) serious manner (except when it’s not) befitting a business podcast (to real people).
  continue reading
 
The Imaginal Podcast is for anyone who wants to break through old criticisms or move through childhood feelings of exclusion in order to express themselves more fully. Sometimes old stories or fears can unnecessarily hold really capable, talented people back. We are often creatives and empaths - people who are generally self-aware yet also have areas of their life that they still want to express whether that's creatively, professionally, relationally or contributorily. It is a place where we ...
  continue reading
 
Artwork

1
Tech Bytes

Packet Pushers

Unsubscribe
Unsubscribe
Monthly+
 
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
  continue reading
 
Artwork

1
Cybertraps Podcast

Frederick Lane & Jethro Jones

Unsubscribe
Unsubscribe
Monthly
 
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
  continue reading
 
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
  continue reading
 
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
The experience era is upon us. Get news, insights, and opinions on the latest disruptions in CX, digital experience (DX), and the business of experience (BX) to expand your mindset about leadership in this new economy.
  continue reading
 
Artwork

1
Convergence

Cato Networks

Unsubscribe
Unsubscribe
Monthly
 
Convergence by Cato Networks is a show for IT professionals made by IT professionals. We'll talk about the most burning questions, hear bolder opinions and mostly learn about what is happening in the IT world today
  continue reading
 
Loading …
show series
 
Enjoy this encore episode. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Implementing SASE can be tricky and onerous, but it doesn't have to be. Today, we discuss Unified SASE as a Service with Renuka Nadkarni, Chief Product Officer at Aryaka. Particularly, how can Unified SASE make both networking and security more flexible and agile? IT and security professionals need to ensure secure and performant applications and d…
  continue reading
 
This episode is a part of a special series of interviews conducted at the INCH360 Cybersecurity Conference in Spokane, Washington. Visit their website to learn more about INCH360 and their mission. In this episode, Jethro Jones welcomes Joe Gellatly, founding partner of Medcurity. Joe discusses the importance of cybersecurity in healthcare, how Med…
  continue reading
 
In the enterprise security news, Some big fundings no less than 4 acquisitions Silencing the EDR silencers ghost jobs overinflated estimates on open cybersecurity jobs weaponizing Microsoft Copilot fun projects with disposable vapes All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-383…
  continue reading
 
Is it a product or a feature? Is it DLP 4.0, or something legitimately new? Buy now, or wait for further consolidation? There are SO many questions about this market. It's undeniably important - data hygiene and governance continues to be a frustrating mess in many organizations, but is this the solution? We'll discuss with Todd to find out. Show N…
  continue reading
 
CISOs struggle more with reactive budgets than CIOs or CTOs. It's not that part of the CISO's budget shouldn't be reactive, it's certainly necessary to an extent. The problem is when proactive measures suffer as a result. In this interview, we'll discuss some of the causes behind this and some strategies for breaking out of this loop. This segment …
  continue reading
 
In the news: Pacific Rim, Linux on Windows for attackers, one of the worst cases of a former employee's retaliation, Zery-Day FOMO, we predicted that, hacking for fun, working hard for no PoC, an LLM that discovers software vulnerabilities, absurd fines, long usernames and Okta, and paying a ransom with dough! Show Notes: https://securityweekly.com…
  continue reading
 
This special “Power Play” episode recaps insights on the transformative impact of Network-as-a-Service, emphasizing flexibility, automation, and cloud-inspired models. Expert analysts from Frost & Sullivan, AvidThink, and Dell’Oro Group weigh in on the dynamic, scalable nature of NaaS, and its alignment with enterprises’ growing preference for cons…
  continue reading
 
Microsoft delays Recall AGAIN, Project Zero uses an LLM to find a bugger underflow in SQLite, the scourge of infostealer malware, zero standing privileges is easy if you have unlimited time (but no one does), reverse engineering Nintendo's Alarmo and RedBox's... boxes. Bonus: the book series mentioned in this episode The Lost Fleet by Jack Campbell…
  continue reading
 
Today’s cyber threat actors are capitalizing on organizations’ identity vulnerabilities, such as MFA. Nearly 75% of cloud security failures now result from mismanaged identities, access, and privileges, and the identity attack surface is becoming more challenging to protect as companies expand their cloud environments and supply chains to meet thei…
  continue reading
 
After spending a decade working for appsec vendors, Grant McKracken wanted to give something back. He saw a gap in the market for free or low-cost services for smaller organizations that have real appsec needs, but not a lot of means to pay for it. He founded DarkHorse, who offers VDPs and bug bounties to organizations of all sizes for free, or for…
  continue reading
 
Merger and acquisition (M&A) activity in finally starting to pick up. Although the allure of financial gains and market expansion drives these deals, the digital age demands a rigorous assessment of cybersecurity risks accompanying such mergers. Unanticipated cyber issues, like dormant malware or inconsistent access controls, can transform an ideal…
  continue reading
 
This week, in the enterprise security news: the latest cybersecurity fundings Cyera acquires Trail Security Sophos acquires Secureworks new companies and products more coverage on Cyberstarts’ sunrise program AI can control your PC public cybersecurity companies are going private Splunk and Palo Alto beef All that and more, on this episode of Enter…
  continue reading
 
Recall III: the Re-Re-Recalling, Russia, Win 10, Phish n Ships, Midnight Blizzard, Emerald Whale, Rob Allen, and More, on this edition of the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/unitedhealth-says-data-of-100-million-stolen-in-change-healthcare-breach/ This segment is sponsored by ThreatLocker. Vis…
  continue reading
 
The future is here! Imagine if you could get into the office, a datacenter, or even an apartment building as easily as you unlock your smartphone. Alcatraz AI is doing exactly that with technology that works similarly to how smartphones unlock using your face. It works in the dark, if you shave off your beard, and so quickly you don't even need to …
  continue reading
 
Join us on the SDN Tech Networking Podcast, the world's first human-curated AI podcast, where we break down complex topics into bite-sized, easy-to-digest pieces. In this episode, we dive into Software Defined Networking (SDN) and explore how it's shaking up enterprise networks. Learn about the basics of SDN, its benefits, and why it's crucial for …
  continue reading
 
Google's cookie encryption drama, Microsoft accusing Google of shady antitrust tactics, AI shenanigans, the rejected Defcon talk and hacking traffic lights, vulnerabilities in Realtek SD card readers, the never-ending debate on quantum computing vs. cryptography, backdoors are not secrets and where we are pushing attackers, firmware leakage, more o…
  continue reading
 
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
  continue reading
 
Generative AI has been the talk of the technology industry for the past 18+ months. Companies are seeing its value, so generative AI budgets are growing. With more and more AI agents expected in the coming years, it’s essential that we are securing how consumers interact with generative AI agents and how developers build AI agents into their apps. …
  continue reading
 
Better TLS implementations with Rust, fuzzing, and managing certs, appsec lessons from the everlasting transition to IPv6, LLMs for finding vulns (and whether fuzzing is better), and more! Also check out this presentation from BSides Knoxville that we talked about briefly, https://youtu.be/DLn7Noex_fc?feature=shared Show Notes: https://securityweek…
  continue reading
 
Identity continues to be one of the most used attack vectors by cybercriminals. From phishing to credential stuffing to password spraying – threat actors are finding new ways to infiltrate systems and cause costly problems to companies. David Bradbury, Chief Security Officer at Okta, joins Security Weekly's Mandy Logan to discuss today's threat lan…
  continue reading
 
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
  continue reading
 
Loading …

Quick Reference Guide