show episodes
 
Loading …
show series
 
This podcast is produced in conjunction with Prospection Medical data on patients and their treatments forms highly complex data sets that need specialist software to decode and examine. Among the few organizations that can address the challenges of medical information is Prospection, an Aussie business that works with clinicians, pharmaceutical co…
 
This podcast is produced in conjunction with NGINX. From its earliest incarnations as the first serious challenger to the Apache web server, NGINX has become the go-to platform for modern applications, used for app management, API mediation, proxying, load-balancing, security, and more. This podcast is the audio-only version of the fireside chat, h…
 
This podcast is produced in conjunction with Wipro. When organisations make an investment in technology or an IT transformation, the decision to do so should be based on a mixture of business strategy and technical knowledge. In either arena, it's always a positive thing to bring in an outside, objective view of what's needed, and why. Our guest in…
 
As cyber criminals evolve their methods, a zero-trust framework can help prevent a goodly number of attacks by ensuring users, applications, and devices are allowed to even begin interacting with protected system. Then, after being admitted (with minimum privileges), the framework checks again and again, at every point of interaction, to make sure …
 
Multifactor authentication (MFA) is fast becoming a requirement for a secure business network. Not only that, it's becoming a requirement for a business to qualify for the added protection of cyber insurance. WatchGuard Technologies Director of Authentication Alexandre Cagnoni takes us through why multi-factor authentication is so important in the …
 
Cybersecurity Awareness Month turns 18 this October 2021. And just like other 18-year olds, it's graduated from dealing with fairly straight-forward problems to facing complex issues. But National Cyber Security Alliance (NCSA) Interim Executive Director Lisa Plaggemier tells us, that there are a few simple steps individuals and businesses can take…
 
Ransomware infections have been rampant in recent months. But typically, we hear more about the aftermath then what leads to a successful attack. In this episode we get the other angle. Sophos VP of Managed Threat Operations Mat Gangwer shares the multi-week story of an attack, from unpatched vulnerability to execution. The responsible ransomware c…
 
The internet's original designers didn't consider the medium's use for crime; unfortunately, that's the reality we all face every day online. This podcast looks at some of the cybersecurity issues facing companies doing business digitally. Our guest is Aaron Bugal, Global Solutions Engineer at Sophos, one of the world's leading cybersecurity compan…
 
This podcast is produced in conjunction with SUSE In this episode of the Tech Means Business podcast we look at the edge, and really dig into how it's best defined and used by organizations. Edge computing environments are often characterized by the prevalence of IoT or IIoT devices, so any discussion about edge usually involves talking about app d…
 
Zero-trust is the hot term in network security in 2021. But one reason it's so highly sought out is that many don't know exactly what it means. We called on Fortinet Senior Director of Product Marketing Peter Newton to shed some light on the subject. Peter discusses what makes a zero-trust network philosophy, what steps a company should take to pla…
 
Many if not most workers began working from home in March of 2020, and while the numbers have shifted since, a significant portion are still doing at least some remote work. But according to a survey, neither the remote workers or their company IT staff are too happy about the cybersecurity of it all. For our featured topic this episode, we dive in…
 
Back in the day, a small company called Citrix started pushing technology that allowed computers, and what became their desktops, to be reached and controlled remotely. Initially, the concept was treated as backwards-looking, harking back to the days when mainframes were addressed by thin clients. From being the CEO of Citrix, Mark B. Templeton has…
 
We previewed cyber security policy under President Biden at the beginning of 2021. But a lot of big things have happened in cybersecurity since then, making now seem a pretty good time to check in on where things stand. So we brought in an expert to help: NextGov's Mariam Baksh. Mariam tells us about the latest developments from the White House rel…
 
While ransomware has taken center stage for several months now, bad actors aren’t resting on their laurels with existing tools. Threatpost Senior Editor Tara Seals joins us to discuss a newly discovered malware, dubbed Chaos. We talk about what it resembles, what it may do, and why you should be worried. Plus, Tara tells us why the Friends reunion …
 
Ransomware takes center stage in SonicWall's Mid-Year Update to its 2021 Cyber Threat Report. Out in late July, the report outlines just how bad the ransomware situation currently is, and Brook Chelmo joins us to take a closer look. We also discuss other highlights including positive news about malware in general and non-standard ports, as well as …
 
The great promise of containerized applications and services is one of true platform agnosticism. Microservices are quick to spin up, knit together, and scale, are less resource-intensive than full-blooded virtual machines and can be deployed on hybrid infrastructure as easily as on a single bare metal instance. As organizations start to explore th…
 
We've turned 50, as in 50 episodes old, yet cybersecurity hasn't aged a day since we started. Ok, maybe that's not true. We take a look back over our half a hundred's worth of podcasts, spotlighting some top clips, and seeing where things stand with them now. Highlights include a pre-pandemic prediction of work from home security issues, our first …
 
"Hybrid work is here to stay." So says Brett Wilson, Chief Operating Officer – Infrastructure & Risk at Interactive, an Australian company specialising in remote working, business continuity, protection, and general operational resilience. In this podcast, host Joe Green talks to Brett about how the shape of work is changing, how it's changed since…
 
This podcast is produced in conjunction with SAP Many of the world's enterprise-scale businesses and organizations run on software from SAP. The company produces one of the best-known ERP (enterprise resource planning) solutions today, where smart software helps companies with every aspect of their operations, from accounts, HR, operations, busines…
 
With ransomware attacks seemingly at a fever pitch of late, the cyber insurance industry has come into stark focus as well, as some companies turn to their insurers to cover a ransom when attacked. But Cyber Research Analyst Jamie MacColl with the UK’s Royal United Services Institute (RUSI) tells us cyber insurance is more than just paying ransoms.…
 
This podcast is produced in conjunction with McAfee With almost every organization on the planet now making at least some use of cloud computing, how are they protecting those remote operations and their data from a cyber-attack? McAfee has transitioned from a provider of antivirus software on desktops to a device-to-cloud cybersecurity company. It…
 
The network perimeter basically no longer exists, and the latest security solutions need to account for the new normal. Aaron Chen and Shane Davis with Sophos join us to talk about how the network security landscape has changed just in the last couple of years, new business cybersecurity and connectivity priorities, and the latest Sophos products t…
 
In an internet environment that's seen the deterioration of privacy over the last few years especially, there are various methods people and businesses can use to stop sensitive information being leeched away. Some of them -- like setting up a VPN tunnel -- are difficult to achieve in ways that are scalable and reliable. This episode's guest, Seven…
 
Cybersecurity jobs are there for the taking, whether for prospective students or career changers willing to train, as employers desperately search for qualified staff. Dr. Marc Rogers of Purdue University joins us to talk about the shortage of cybersecurity pros in our home state of Indiana and beyond, and how a new website serves as a cyber career…
 
We're fortunate to have two excellent interviews to share on this episode of Ping. First, we discuss the op-ed Cyber Security as Counter-Terrorism: Seeking a Better Debate (https://warontherocks.com/2021/05/cyber-security-as-counter-terrorism-seeking-a-better-debate/) with co-authors Emma Schroeder and Trey Herr with the Atlantic Council's Cyber St…
 
In the latest case of real world implications stemming from a cyber attack, operations of the Colonial Pipeline, supplying almost half of the gasoline to the east coast of the U.S., stopped suddenly. Why? Colonial was the victim of a ransomware attack connected to the DarkSide group. We dissect the details of the attack, how it happened, what it me…
 
Giant stadiums and local sports grounds all over the world lie empty with sports men and women competing to no audience at all, in most cases. Can tech save sport? Steve Madincea of Fantastec thinks so. His company is behind a digital memorabilia trading platform that's powered by blockchain, and he has plenty more projects at different stages of c…
 
While HTML email is nothing new, a recently discovered trick means a pretty wide open security flaw has been there all along, too. Security researcher, engineer, & tech columnist Ax Sharma joins us to explain how just a bit of code in the wrong hands can manipulate the "external sender" warning on your organization's emails - to either remove it al…
 
What's your password? If you can come up with just one off the top of your head for all your accounts, you're probably doing it wrong. We take a look at just how wrong some are doing passwords courtesy of a British survey (https://www.ncsc.gov.uk/news/national-pet-day-password-advice). But don't fret, we also offer tips on how to do your passwords …
 
This episode looks at one of technology's less-regarded aspects, but one that needs quickly to be given a whole lot more attention: the sustainability of the tech we use, and our approaches and attitudes to achieve a greener, yet more technologically advanced future. When your organization starts its next procurement round for a desktop or data cen…
 
Cybersecurity laws are somewhat in their infancy in the U.S., but states are starting to get on board. Our guest Cynthia Brumfield, creator of the Metacurity newsletter and writer of all things cyber, tells us about states getting on board with liability protection for companies that take reasonable actions to secure themselves against threats. Wha…
 
This podcast is produced in conjunction with Nuage Networks from Nokia Connectivity is a business imperative and is one of the first things companies plan when they open a new store, branch office or far-flung outpost. It's a whole lot easier to get connected these days, too, but once an organization is linked up, how is that connection best optimi…
 
The year 2020 will be remembered for many things - few positive. And another ignominious distinction has to do with cybercrime. SonicWall's 2021 Cyber Threat Report, just released on March 16, dives deep into the threat landscape to show us just how bad the year was when it comes to cyber attacks - or good if you happen to be launching them. SonicW…
 
IIoT (the industrial internet of things) is already changing the face of manufacturing, utilities and heavy industry. But here and in more white-collar settings, deploying even simple, system-on-chip devices is difficult at scale. In this episode of Tech means Business, we talk to Hima Mukkamala, CEO of Pelion, a spin-off from the chip company that…
 
Spring has sprung - or at least is springing - in many areas, and a major tradition of the season is spring cleaning. And just like you decide which boxes to keep and which ones to dump from your home, your network needs a similar evaluation. How old is your equipment? Does it still do all you need it to? Do you need a few tweaks, or a whole new se…
 
IT professionals have thick skins that deflects most marketing, especially when it comes to AI. After all, your phone apparently uses AI to frame the perfect picture (really?) and your TV knows and adapts to your taste in viewing thanks to "advanced machine learning" (nope). So selling AI into ITops must be an uphill struggle. But with the right me…
 
Employees can either be your first line of defense or your greatest cybersecurity vulnerability if they’re unprepared to deal with online threats. But what’s the best way to prepare them? We talk to Rebecca McKeown, an independent Chartered Psychologist and special advisor to Immersive Labs, for some answers. Rebecca specializes in Cognitive Readin…
 
The technology press is full of references to "stampedes to the cloud" and other, assorted hyperbole. What's undeniable is that although cloud may not be ideal for your use-case, all the latest DevOps tooling is focused towards cloud. If you want hybrid, multi-cloud or vanilla on-premise deployments and still need all the latest and greatest K8s, R…
 
February 7, 2021 marks Super Bowl LV - or 55 for those of us not well-versed in Roman numerals. And just like any other major event, there are cybersecurity implications. We explore them in a pop quiz featuring Tom Brady, the Kansas City Chiefs, Windows, and even Armenia. Listen on to find out how cybersecurity and football intersect. In Ransomware…
 
In addition to the private and public sectors, there's the charity sector. Giving to needy causes is getting easier online and in person, thanks to technology like TapSimple's. In this episode of the Tech Means Business podcast, we talk to Tom Montague, co-founder of the company. After graduating in Bristol (Hybrid News Group's home city), Tom star…
 
As now President Biden enters office, his administration faces a variety of major issues, not only related to the pandemic, but also to cybersecurity and the online world. The continually developing SolarWinds supply chain attack that led to breaches of multiple federal agencies is still making headlines. And data privacy concerns, ransomware, Sect…
 
We like to look forward at Ping, even when the view isn’t always rosy. So for our first episode of 2021, we take a look at predictions by top security firms to give us an idea what to expect in network security for the coming year. After all, knowing is half the battle when it comes to preparation. Andrew and Kevin talk ransomware, AI-enhanced phis…
 
Here at Ping, we like to celebrate the holiday season by sharing stories. And since we’re in the network security business, they tend to have a bit of an unusual twist. Last year, we presented a CyberSecurity Christmas Carol (check it out here: https://www.firewalls.com/blog/cybersecurity-christmas-carol-ping-podcast-episode-9). And this Christmas,…
 
This podcast is produced in conjunction with Cisco Cybercriminals never let up. Even schools and hospitals remained targets at the height of the coronavirus pandemic. For most people, working at home was the reality of their year, and as Kerry confirms, most organizations will be adopting a much more generous working-from-home stance from 2021. The…
 
The cyber threats of this year aren't going away when the calendar flips to 2021. They'll just continue to evolve. For a primer on the online hazards you can expect next year, we welcome back WatchGuard's Marc Laliberte, who - along with his team - has released a set of 2021 Cybersecurity Predictions. We start off by looking back at WatchGuard's 20…
 
Buy a computer chip with some serious "grunt" and you go for Intel, right? Or AMD, perhaps more likely, these days. In whichever case, it's x86 architecture. That's what data centers and clouds run on, after all — these are the serious computers for grown-ups. The little voice you hear, however hails from Cambridge, UK, a little company called ARM,…
 
In a year unlike any other, holiday shoppers are dealing with changes as well. The tradition of a one-day Black Friday (and Cyber Monday) sale, has been replaced with a month-long drip of deals. Our guest Dan Lohrmann dubs this COVID-19-related change, "Cyber November." On this episode, Dan discusses why things have gone even more online than inlin…
 
Nuance Communications is on a mission to put the human voice at the heart of every organization! Forget what you think you know about voice assistants and those hopelessly dumb 'bots you run into when you call into some companies. Nuance is a company that pretty much invented voice recognition and voice-to-text back in the days when such tech was s…
 
A broad federal warning outlines how hospitals and healthcare facilities across the country are in the crosshairs of a wave of ransomware attacks. To discuss this unprecedented coordinated threat, we welcome SonicWall's Barbara Vibbert, who provides context on the variety of vulnerabilities healthcare organizations face, why a successful attack can…
 
Just a few short years ago, technologists were predicting that smart algorithms could determine our tastes and perhaps suggest other goods or services we might buy! Now, with that type of technology a reality, what's the next logical step, and where does that leave our rights to privacy? Who owns our data? Is privacy a human right? How do companies…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login