show episodes
 
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Full Comment is Canada’s podcast for compelling interviews, controversial opinions and fascinating discussions. Hosted by Brian Lilley. Published by Postmedia, new episodes are released each Monday.
  continue reading
 
Artwork
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

Unsubscribe
Unsubscribe
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
HowTo Linux HD

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Artwork

1
MSP 1337

Chris Johnson

Unsubscribe
Unsubscribe
Weekly
 
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference. Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support
  continue reading
 
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
  continue reading
 
Artwork

1
The Wildescast

Manhattan Jewish Experience

Unsubscribe
Unsubscribe
Monthly+
 
Jewish education and inspiration courtesy of Rabbi Mark N. Wildes, Founder of the Manhattan Jewish Experience (MJE). Founded in 1998, MJE is a warm and open community where millennial men and women in their 20s/30s can explore Jewish life and meet new people.
  continue reading
 
Artwork

1
Network Security

University of Twente

Unsubscribe
Unsubscribe
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
  continue reading
 
Artwork

1
fivestones church

fivestones church

Unsubscribe
Unsubscribe
Monthly+
 
fivestones is a Pentecostal church located in Canton, Georgia. Whether you're hungry or hurt, lonely or lost, full of questions or looking for a home, there's a place for you @fivestonesga! Connect with us! www.fivestonesga.com
  continue reading
 
Artwork

1
Fortinet Cybersecurity Podcast

Fortinet Cybersecurity Podcast

Unsubscribe
Unsubscribe
Monthly+
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Welcome to "Securely Connected Everything," a dynamic podcast hosted by Michael van Rooyen (MVR), dedicated to exploring the intricate relationship between connectivity and security in the digital age. Each week, MVR welcomes guests from diverse backgrounds, to shed some light on cutting-edge technologies and methodologies that enhance digital experiences while safeguarding against potential threats. From exploring the origins and capabilities of innovative solutions, to dissecting the impli ...
  continue reading
 
Spot's new podcast, “More Than a Broker,” is hosted by Spot Co-founder, Andrew Elsener. This podcast features interviews with industry experts and explores the latest trends and challenges in the freight transportation industry.
  continue reading
 
Somewhere on Earth: The Global Tech Podcast is a weekly podcast that looks at technology and how it impacts our daily lives. We tell the untold tech stories from Somewhere on Earth. We don’t do new toys and gadgets, but look at new trends, new tech and new ways we use that tech in our everyday lives. We discuss how the ever evolving digital world is changing our culture and our societies, but we don’t shy away from the news of the day, looking at the tech behind the top stories affecting our ...
  continue reading
 
Artwork

1
HumAIn Podcast

David Yakobovitch

Unsubscribe
Unsubscribe
Monthly
 
Welcome to HumAIn, the top 1% global podcast shaping the future of AI and technology. Join host David Yakobovitch, a renowned AI innovator and venture capitalist, as he takes you on an exhilarating journey through the world of Artificial Intelligence, Data Science, and cutting-edge tech. Through intimate fireside chats with Chief Data Scientists, AI Advisors, and visionary leaders, we peel back the curtain on groundbreaking AI products, dissect industry trends, and explore how AI is reshapin ...
  continue reading
 
Artwork

1
DIAF

Adequate.com

Unsubscribe
Unsubscribe
Monthly
 
DIAF is a series of audiobooks presented in podcast format which follow the adventures of Brian Brushwood and Justin Robert Young.
  continue reading
 
Artwork

1
To The Point - Cybersecurity

Forcepoint | Global Cybersecurity Leader | Security. Simplified.

Unsubscribe
Unsubscribe
Monthly+
 
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
  continue reading
 
Artwork

1
CodeBlueTech

CodeBlueTech

Unsubscribe
Unsubscribe
Monthly
 
The Mid-Atlantic’s Best IT services company. Helping Business Owners create, improve and scale their Technology strategy. IT services, IT Security and IT Support advice and leadership from expert professionals. Q&A with Senior Engineers, Service Managers and Business Development.
  continue reading
 
My name is Ely and I’m a full-time and independent graphic designer. My fiancé is Laura Together, we have discovered that no matter how crazy our work lives can be, there is always laughter in it. Although we have much in common, our differences in pets, music, food, movies, and T.V. shows make for the best conversations.
  continue reading
 
Welcome to These Are The Voyages: A Star Trek Podcast. This is your invitation to beam aboard and join us as we have fun together talking Trek. On the 7s of the month join us as we talk about an episode, book, a character, or anything that piques our interest. Grab your tricorder, communicator, and let‘s Boldly Go and Make It So.
  continue reading
 
Artwork

1
TechSNAP

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly
 
Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
  continue reading
 
My Sexy Business Podcast is here to help you create a sexy business for a sexy life through real life examples, interviews and wisdom learned over time. A sexy business is one that you own and it doesn't own you. It attracts customers and clients, it never chases them.
  continue reading
 
Loading …
show series
 
In this episode of the Outside of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes engage in a lively discussion covering a range of topics from personal updates to reflections on past experiences. They explore the importance of community, the role of humor in conversations, and insights into personal growth and challenges. The conve…
  continue reading
 
Wouldn't we be better off if the Democrat and Republican parties each split in half and we had four candidates vying for the presidency instead of two? How is that even imaginable? Bradley talks to Rob Richie, co-founder of FairVote, a group that champions Ranked Choice Voting, about electoral reforms that promise to restore genuine democracy, as o…
  continue reading
 
How do you securely network a "Smart City" that has to be rebuilt over a hundred times each year in different locations around the world, and with no more than a few days of annual downtime?In this episode of Brass Tacks - Talking Cybersecurity, host Joe Robertson meets with Michael Cole, Chief Technology Officer for the European Tour Group, to dis…
  continue reading
 
The Human Firewall: AI's Double Edge in Cybersecurity with Rob Gurzeev of CyCognito Rob Gurzeev is the CEO and Co-Founder of CyCognito, a cutting-edge cybersecurity company trusted by over 20 of the Global 100 companies. With a background in the elite Israeli Intelligence Corps unit 8200, Rob brings a unique blend of offensive security expertise an…
  continue reading
 
L0pht Heavy Industries (pronounced “loft”) was one of the influential hacker groups in history. Unlike many others, L0pht carefully cultivated a relationship with mass media, sold profitable products, started businesses, and even testified before the US Senate. Cris Thomas, aka Space Rogue, was one of the earliest members of the L0pht and he recent…
  continue reading
 
Ever wondered what it takes to stay ahead in the fast-paced world of cybersecurity? Join us as we chat with Jack Chan, Fortinet's Vice President of Product Management and Field CTO for APAC, who brings nearly two decades of industry experience to the table. We'll explore Jack's fascinating journey from a NetScreen trainer to a leading figure in cyb…
  continue reading
 
The now legendary “firewall letter” stunned Canadian political watchers. Officially called the Alberta Agenda, it called on the province to start taking back powers from the federal government, refusing to be taken further advantage of. And for 20 years, Alberta governments largely ignored it. But as former provincial finance minister Ted Morton di…
  continue reading
 
Welcome to "To The Point Cybersecurity," the podcast where we dive deep into the most pressing issues in global cybersecurity, explore emerging threats, and discuss innovative solutions. In this episode," our hosts Rachael Lyon and Vince Spina welcome Philippe Humeau, CEO of CrowdSec, an expert in adaptive cybersecurity measures. Philippe brings to…
  continue reading
 
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer celebrate four years of podcasting, reflecting on their journey and the importance of providing actionable insights to their audience. They discuss the significance of education in technology, particularly in relation to Microsoft products and the recent deprecatio…
  continue reading
 
Send us a text So, my daughters like to give me a hard time about growing old. Said another way, I’m a legacy asset - just like most of the devices many of you observe, manage and secure every day. Your machines are still in place because they work. While the technology around these assets has evolved, their core functionality and value to the prod…
  continue reading
 
AWS Scans; Gatekeeper Bypass; Oracle CPU; Cisco ATA 190 Patch; SAP Code Injection; Dept of Commerce Advertises Drugs; Scanning Activity from Subnet 15.184.0.0/16. https://isc.sans.edu/diary/Scanning%20Activity%20from%20Subnet%2015.184.0.0%2016/31362 Gatekeeper Bypass /unit42.paloaltonetworks.com/gatekeeper-bypass-macos/ Oracle Critical Patch Update…
  continue reading
 
What’s next for agritech? How lawyers are getting food from farm to table Agriculture is changing, and with it, so is agritech. Incredible new tech solutions are needed as the human population continues to grow and climate change necessitates updates to our traditional farming methods. This week, we have a special podcast from White & Case, an inte…
  continue reading
 
In this conversation, Ryan Williams and Dr. T explore the significance of mental health, the challenges neurodivergent individuals face in the tech industry, and the importance of building community connections. They discuss the inception of Repped In Tech, a platform aimed at enhancing representation and support for neurodivergent individuals in t…
  continue reading
 
Not so Common Passwords; Security Bad Practices; Kubernetes Image Builder Vuln; Solarwinds Helpdesk Exploited; noexec bypass The Top 10 Not So Common SSH Usernames and Passwords https://isc.sans.edu/diary/The%20Top%2010%20Not%20So%20Common%20SSH%20Usernames%20and%20Passwords/31360 CISA Product Security Bad Practices https://www.cisa.gov/resources-t…
  continue reading
 
Many industries are reliant on software and if the software becomes corrupt or an update fails, it may require hands-on support. Do you have your infrastructure set for repair and recovery? Today’s guest is Gabe Dimeglio. Gabe is a 20-year veteran of information technology and security for private and public sector organizations. He is a results-dr…
  continue reading
 
Demo Script Exploits; Angular-base64-upload Demo Script Exploited https://isc.sans.edu/diary/Angular-base64-upload%20Demo%20Script%20Exploited%20%28CVE-2024-42640%29/31354 Quantum Annealing Public Key Cryptographic Attack Algorithm Based on D-Wave Advantage http://cjc.ict.ac.cn/online/onlinepaper/wc-202458160402.pdf EDRSilencer https://github.com/n…
  continue reading
 
Industrial Control Systems (ICS) and Operational Technology (OT) used to stand apart from traditional IT. But those worlds are converging, and IT pros, including infosec teams and network engineers, need to become familiar with the operational challenges and quirks of ICS/OT systems. On today’s Packet Protector, guest Mike Holcomb demystifies ICS a…
  continue reading
 
What is your company's will? This Fireside Chat with Matt Lee tackles the Acceptable Use Policy, Written information security plan, Roles, and responsibilities. Please give us feedback, as we have a pretty healthy disagreement on a few items and are hoping that you, the listener, can help us find a new path forward. --- Support this podcast: https:…
  continue reading
 
Summary In this episode, Andy Jaw and Adam Brewer discuss Microsoft's Secure Future Initiative (SFI), which emphasizes security by design, default, and operations. They explore the initiative's six key security pillars, the impact of recent cyber incidents, and the ongoing progress in enhancing security measures across Microsoft. The conversation h…
  continue reading
 
Welcome back to Forcepoint! In today's episode, hosts Rachael Lyon and Vince Spina dive deep into the ever-evolving world of cybersecurity with special guest Ross Young, CISO in Residence at Team 8. Drawing on his extensive experience with top companies and intelligence agencies, Ross shares insights on critical issues like flexible work arrangemen…
  continue reading
 
How Harris and Trump administrations will differ on managing the economy, business and tech. Plus, Bradley talks about mysterious drones, going to movies in person, mini-golf vs. real golf, the pluses and minuses of living in Soho, the New Yorker's big piece on Chris Lehane, alternatives to "taking a knee" in football and why men not going to colle…
  continue reading
 
Blog Phishing; Fortigate Vuln Deep Dive; CLI Entrypoint Takeover Phishing Page Delivered Through a Blob URL https://isc.sans.edu/diary/Phishing%20Page%20Delivered%20Through%20a%20%20Blob%20URL/31350 Fortinet Fortigate CVE 2024-23113 deep dive https://labs.watchtowr.com/fortinet-fortigate-cve-2024-23113-a-super-complex-vulnerability-in-a-super-secur…
  continue reading
 
British Columbia voters are so unhappy that they might elect a party this week that barely existed two years ago: the Conservatives led by John Rustad. No wonder. As veteran B.C. politics columnist Vaughn Palmer tells Brian, voters see crime as out of control; drug decriminalization creating no-go zones everywhere; and immigration soaring even as t…
  continue reading
 
Windows PPTP/L2TP Deprecation; BIG-IP Cookie Issues; Travel Platforms Targeted Windows PPTP and L2TP Deprecation https://techcommunity.microsoft.com/t5/windows-server-news-and-best/pptp-and-l2tp-deprecation-a-new-era-of-secure-connectivity/ba-p/4263956 BIG-IP LTM Systems Unencrypted Cookie Exploitation https://www.cisa.gov/news-events/alerts/2024/1…
  continue reading
 
GPTHoney; PaloAlto "Exploit"; Firefox 0-Day; GitLab Vuln; GPTHoney: A new class of honeypot https://isc.sans.edu/diary/GPTHoney%3A%20A%20new%20class%20of%20honeypot%20%5BGuest%20Diary%5D/31342 Palo Alto Expedition: From N-Day to Full Compromise https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/ Firefox 0-Day…
  continue reading
 
Send us a text While the justifications for additional cybersecurity spending is easy to explain, getting buy-in at the C-level can be difficult. However, some recent research might help you win over those controlling the purse strings. SonicWall’s Mid-Year Cyber Threat Report found that their firewalls were under attack 125 percent of the time dur…
  continue reading
 
Serious question: Do mediocre and average mean the same thing? Everybody Bradley asked told him no, that mediocre is worse, but he remains convinced they are the same. Plus, he cheers the federal court's ruling in favor of Epic Games in its lawsuit against Google over monopolistic behavior, outlines the philosophical dilemmas he has been wrestling …
  continue reading
 
Could making Wikidata 'human' readable lead to better AI? A new project is underway to allow Large Language Models (LLMs) to read Wikidata. The data is currently structured in a way that’s machine readable, but LLMs read data more like humans than machines, meaning this vast amount of human curated, high quality data isn’t accessible to this type o…
  continue reading
 
Perfctl to Infostealer; Wazuh Malware Distribution; USB Airgab Bridge; Fortigate Vuln Exploited From Perfctl to InfoStealer https://isc.sans.edu/diary/From%20Perfctl%20to%20InfoStealer/31334 Wazuh Abused by Miner Campaign https://securelist.com/miner-campaign-misuses-open-source-siem-agent/114022/ USB Sticks Still Bridge Airgaps https://www.welives…
  continue reading
 
Dual international for Malaysia and Ireland Al-Jeffery Iszeham joins the podcast to talk all things Touch Malaysia. Jeff tells us about his Coaching Director role for Touch Malaysia, his experience as a dual international, and the development of the game in his home country. We play our usual games and have a very food based discussion in this epis…
  continue reading
 
Beyond Spreadsheets: How Ambient AI is Reshaping Financial Planning with Runway’s CEO Siqi Chen Siqi Chen is the CEO and Founder of Runway, a finance platform revolutionizing business planning and analysis. With a diverse background spanning gaming, social media, and technology, Siqi has been a serial entrepreneur and leader in the tech industry fo…
  continue reading
 
Change of Circumstances – In Acts chapter 12, Peter is miraculously released from prison, and James is beheaded. Why did God seemingly deliver one and not the other? Why does God sometimes intervene in our circumstances, and not other times? We talk about that today. And don’t miss the end of the service where Doris Thompson shares about her miracu…
  continue reading
 
A Change of Allegiance – Being good isn’t good enough. In the book of Acts, Cornelius was a good man, a God-fearing man, but he did not know Jesus. God sent Peter to Cornelius so he could hear and accept the good news of Jesus for himself. Cornelius offers a key reminder that being a good person isn’t enough. Only Jesus saves. Hear our earlier mess…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss the latest trends in cybersecurity, focusing on the human element in data breaches. They explore the findings from Verizon's 2024 Data Breach Investigation Report, highlighting that 68% of breaches involve a non-malicious human element. The …
  continue reading
 
It’s not always easy to determine the value of digital assets. The potential of overestimating or undervaluing your data can make it difficult to establish how much protection you need for a cyber intrusion. Today’s guest is Jeremiah Grossman. Jeremiah has spent over 25 years as an InfoSec professional and hacker. He is the Managing Director of Gro…
  continue reading
 
Loading …

Quick Reference Guide