This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
…
continue reading
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
…
continue reading
1
TWiET 573: DNS Deep Dive Part 3: Exploring Internal DNS and AD - KV-Botnet, Internal DNS Security, and Farewell Episode
1:15:07
1:15:07
Play later
Play later
Lists
Like
Liked
1:15:07
The TWiET crew delves into botnets, securing hybrid work environments, the future of DNS architecture, and more. News Blips: Researchers uncover sophisticated IoT botnet named "K- Botnet" targeting US entities; linked to Chinese state-aligned hackers AI startup Vanta (a TWiT.tv Sponsor) launches AI suite to automate repetitive security and complian…
…
continue reading
1
TWiET 573: DNS Deep Dive Part 3: Exploring Internal DNS and AD - KV-Botnet, Internal DNS Security, and Farewell Episode
1:15:07
1:15:07
Play later
Play later
Lists
Like
Liked
1:15:07
The TWiET crew delves into botnets, securing hybrid work environments, the future of DNS architecture, and more. News Blips: Researchers uncover sophisticated IoT botnet named "K- Botnet" targeting US entities; linked to Chinese state-aligned hackers AI startup Vanta (a TWiT.tv Sponsor) launches AI suite to automate repetitive security and complian…
…
continue reading
1
TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System
1:13:10
1:13:10
Play later
Play later
Lists
Like
Liked
1:13:10
Proxy trojan targets macOS users for traffic redirection Indoor navigation has had a slow start Krasue RAT uses cross-kernel Linux rootkit to attack telecoms U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of In…
…
continue reading
1
TWiET 572: DNS Deep Dive Part 2: External Authoritative DNS - Journey into the Heart of the Domain Name System
1:13:10
1:13:10
Play later
Play later
Lists
Like
Liked
1:13:10
Proxy trojan targets macOS users for traffic redirection Indoor navigation has had a slow start Krasue RAT uses cross-kernel Linux rootkit to attack telecoms U.S. approves first gene-editing treatment, Casgevy, for sickle cell disease The DNS Deep-Drive continues with guests Josh Kuo, DNS expert, and Ross Gibson, Principal Solutions Architect of In…
…
continue reading
1
TWiET 571: DNS Deep Dive Part 1: Demystifying DNS - Enterprise DNS basics
1:08:10
1:08:10
Play later
Play later
Lists
Like
Liked
1:08:10
Hackers Can Easily Extract ChatGPT Training Data Cheebert's prediction about VDI just came true Big Tech jobs are not as immune to layoffs as we thought Siemens PLCs are Still Vulnerable to Stuxnet-like Cyberattacks Josh Kuo, DNS Expert and Ross Gibson, Principal Solutions Architect of Infoblox join Brian Chee and Curt Franklin for part 1 of a 3 pa…
…
continue reading
1
TWiET 571: DNS Deep Dive Part 1: Demystifying DNS - Enterprise DNS basics
1:08:10
1:08:10
Play later
Play later
Lists
Like
Liked
1:08:10
Hackers Can Easily Extract ChatGPT Training Data Cheebert's prediction about VDI just came true Big Tech jobs are not as immune to layoffs as we thought Siemens PLCs are Still Vulnerable to Stuxnet-like Cyberattacks Josh Kuo, DNS Expert and Ross Gibson, Principal Solutions Architect of Infoblox join Brian Chee and Curt Franklin for part 1 of a 3 pa…
…
continue reading
1
TWiET 570: Well-Placed Friction - EU's NIS2 Directive, better UX for DevOps w/ LaunchDarkly
1:11:11
1:11:11
Play later
Play later
Lists
Like
Liked
1:11:11
Ransomware group reports a victim company to the SEC for failing to promptly disclose a breach. Shadowy hack-for-hire group behind sprawling web of global cyberattacks Electrical arc detection devices that can prevent dangerous home fires caused by faulty wiring. The worst passwords of 2023 The NIS2 Directive: The first piece of EU-wide legislation…
…
continue reading
1
TWiET 570: Well-Placed Friction - EU's NIS2 Directive, better UX for DevOps w/ LaunchDarkly
1:11:11
1:11:11
Play later
Play later
Lists
Like
Liked
1:11:11
Ransomware group reports a victim company to the SEC for failing to promptly disclose a breach. Shadowy hack-for-hire group behind sprawling web of global cyberattacks Electrical arc detection devices that can prevent dangerous home fires caused by faulty wiring. The worst passwords of 2023 The NIS2 Directive: The first piece of EU-wide legislation…
…
continue reading
1
TWiET 569: Are Your Patches trackd? - Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD
1:13:00
1:13:00
Play later
Play later
Lists
Like
Liked
1:13:00
CISA Alerts: High-Severity SLP Vulnerability currently being exploited. ChatGPT outages attributed to DDoS activity. Gen Z and Millennial employees are a bigger cybersecurity risk than older employees. Security firm finds highly invasive malware hidden in software developer tools. Strategies for bridging the cybersecurity skills gap. Mike Star, CEO…
…
continue reading
1
TWiET 569: Are Your Patches trackd? - Bridging the cybersecurity skills gap, vulnerability and patch management with TrackD
1:13:00
1:13:00
Play later
Play later
Lists
Like
Liked
1:13:00
CISA Alerts: High-Severity SLP Vulnerability currently being exploited. ChatGPT outages attributed to DDoS activity. Gen Z and Millennial employees are a bigger cybersecurity risk than older employees. Security firm finds highly invasive malware hidden in software developer tools. Strategies for bridging the cybersecurity skills gap. Mike Star, CEO…
…
continue reading
1
TWiET 568: Find the Gap Before You $pend - President Biden's AI Executive Order, Software TCO with Olive
1:05:07
1:05:07
Play later
Play later
Lists
Like
Liked
1:05:07
Okta customer data exposed in support breach impacting 134 companies. Biden requests $3.1B more for FCC's "rip-and-replace" program to remove insecure equipment from federal networks, targeting Huawei and ZTE equipment. Kaspersky finds Android spyware targeting WhatsApp users, reusing malware from Telegram cyber attacks. U.S. Immigration and Custom…
…
continue reading
1
TWiET 568: Find the Gap Before You $pend - President Biden's AI Executive Order, Software TCO with Olive
1:05:07
1:05:07
Play later
Play later
Lists
Like
Liked
1:05:07
Okta customer data exposed in support breach impacting 134 companies. Biden requests $3.1B more for FCC's "rip-and-replace" program to remove insecure equipment from federal networks, targeting Huawei and ZTE equipment. Kaspersky finds Android spyware targeting WhatsApp users, reusing malware from Telegram cyber attacks. U.S. Immigration and Custom…
…
continue reading
1
TWiET 567: Lost in Translation - Boosting security hygiene, DNS security with Infoblox
1:16:01
1:16:01
Play later
Play later
Lists
Like
Liked
1:16:01
iLeakage gives hackers access passwords and sensitive data on iOS and macOS browsers. 0ktapus is "one of the world's most dangerous financial criminal groups" says Microsoft. Apple backs national right-to-repair bill. Pro-Russia hackers exploiting 0-day in Roundcube webmail software. 9 innovative ways to boost security hygiene for Cyber Awareness M…
…
continue reading
1
TWiET 567: Lost in Translation - Boosting security hygiene, DNS security with Infoblox
1:16:01
1:16:01
Play later
Play later
Lists
Like
Liked
1:16:01
iLeakage gives hackers access passwords and sensitive data on iOS and macOS browsers. 0ktapus is "one of the world's most dangerous financial criminal groups" says Microsoft. Apple backs national right-to-repair bill. Pro-Russia hackers exploiting 0-day in Roundcube webmail software. 9 innovative ways to boost security hygiene for Cyber Awareness M…
…
continue reading
1
TWiET 566: DevOps Culture Vulture - Reimagining DevOps with System Initiative
1:17:27
1:17:27
Play later
Play later
Lists
Like
Liked
1:17:27
This info-packed episode of TWiET dives into the hidden dangers of Google hosted ads with malware. Guest Adam Jacob shares his vision for a "second wave" of DevOps to achieve better collaboration and outcomes. Patch Winrar right now The most used IT Admin passwords Cisco reports 10,000 network devices backdoored with unpatched 0-day The global chip…
…
continue reading
1
TWiET 566: DevOps Culture Vulture - Reimagining DevOps with System Initiative
1:17:27
1:17:27
Play later
Play later
Lists
Like
Liked
1:17:27
This info-packed episode of TWiET dives into the hidden dangers of Google hosted ads with malware. Guest Adam Jacob shares his vision for a "second wave" of DevOps to achieve better collaboration and outcomes. Patch Winrar right now The most used IT Admin passwords Cisco reports 10,000 network devices backdoored with unpatched 0-day The global chip…
…
continue reading
1
TWiET 565: Cheebert's MDM Dreams - Adobe's Content Credentials, programmable MDM with Fleet
1:12:03
1:12:03
Play later
Play later
Lists
Like
Liked
1:12:03
On This Week in Enterprise Tech, Lou, Curt, and Brian dive into how remote console devices are empowering IT pros, the future of digital trust and content authenticity, and the evolving landscape of endpoint management security. Jeff Marraccini from Altair explains how air console devices allow him to remotely access noisy server racks to diagnose …
…
continue reading
1
TWiET 565: Cheebert's MDM Dreams - Adobe's Content Credentials, programmable MDM with Fleet
1:12:03
1:12:03
Play later
Play later
Lists
Like
Liked
1:12:03
On This Week in Enterprise Tech, Lou, Curt, and Brian dive into how remote console devices are empowering IT pros, the future of digital trust and content authenticity, and the evolving landscape of endpoint management security. Jeff Marraccini from Altair explains how air console devices allow him to remotely access noisy server racks to diagnose …
…
continue reading
1
TWiET 564: Data Is Bigger In Texas - Cybersecurity Recruitment, Edge Computing, Hyperscale Cloud With Involta
1:10:40
1:10:40
Play later
Play later
Lists
Like
Liked
1:10:40
This episode of This Week In Enterprise Tech discusses the major cybersecurity recruitment challenges organizations face today and dives into the world of enterprise edge computing and the future of hyperscale cloud services with Scott Evers of Involta. News Blips: The hosts discuss a severe vulnerability in Atlassian's Confluence Server that allow…
…
continue reading
1
TWiET 564: Data Is Bigger In Texas - Cybersecurity Recruitment, Edge Computing, Hyperscale Cloud With Involta
1:10:40
1:10:40
Play later
Play later
Lists
Like
Liked
1:10:40
This episode of This Week In Enterprise Tech discusses the major cybersecurity recruitment challenges organizations face today and dives into the world of enterprise edge computing and the future of hyperscale cloud services with Scott Evers of Involta. News Blips: The hosts discuss a severe vulnerability in Atlassian's Confluence Server that allow…
…
continue reading