A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
We provide the CHEAPEST and HIGHEST QUALITY web services in Singapore! Professional and experienced work ranging from SEO to logo design, art drawing, etc!
…
continue reading
"Speaking of SurgOnc" is a podcast series brought to you by the Annals of Surgical Oncology (ASO) and the Society of Surgical Oncology(SSO). Dr. Frederick L. (Rick) Greene, ASO Deputy Editor, will explore and expand upon ideas and concepts described in articles published in the Annals of Surgical Oncology. Dr. Greene will interview authors and leading experts about topics of current importance in surgical oncology.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
ASCO Guidelines features key recommendations from the latest evidence-based clinical practice guidance from ASCO that you can access on the go.
…
continue reading
A Podcast For Jamf Employees And Customers
…
continue reading
The Enterprise Mobility Roundup takes a look at mobility in the enterprise, focusing on workforce devices, business applications and the technology behind them.
…
continue reading
A weekly Salesforce podcast that helps you become a better Salesforce technologist.
…
continue reading
The goal of this show is to help Architecture, Design, and Engineering professionals discover and implement the right technology so their teams can focus on doing their best work. We learn a lot providing IT services to AEC companies and we share that knowledge in our weekly Design Under Influence podcast and video show. You see, we feel that running an architecture firm or a design studio without focusing on utilizing technology is almost like designing under influence. Sometimes this may b ...
…
continue reading
Giving you news and interviews with topics related to Cryptocurrency, Blockchain, and Web3. Special attention to the Algorand ecosystem!
…
continue reading
The podcast connecting identity and business. Each episode features an in-depth conversation with an identity management leader, focusing on industry hot topics and stories. Join Oscar Santolalla and his special guests as they discuss what’s current and what’s next for digital identity. Produced by Ubisecure.
…
continue reading
In this episode, Andy and Adam discuss the growing threat of mobile device threats. They highlight the recent mass password reset and account lockout of Apple IDs and the potential for a mobile wormable event. They explore the conditions necessary for a mobile wormable attack, including the development of zero-click exploits, the abuse of contact l…
…
continue reading
1
Survivorship Care for People Affected by Advanced or Metastatic Cancer: MASCC-ASCO Standards and Practice Recommendations
21:39
21:39
Play later
Play later
Lists
Like
Liked
21:39
Dr. Raymond Chan and Dr. Larissa Nekhlyudov share the newest standards and practice recommendations from MASCC and ASCO on survivorship care for people with advanced or metastatic cancer. They discuss highlights of the standards across seven domains: person-centered care, coordinated and integrated care, evidence-based and comprehensive care, evalu…
…
continue reading
1
ArchiCAD vs. AutoCad - The Power of Collaboration and Parametric Optimism
44:20
44:20
Play later
Play later
Lists
Like
Liked
44:20
For more information about our Specialized IT support for architecture and engineering firms, visit our website.By Boris Rapoport and Alex Osenenko
…
continue reading
Remember the ‘90s when Micrososft was the big bad wolf with their anti-competitive methods of pushing Internet Explorer at the expense of Netscape and other non-microsoft browsers? Now the eye of Sauron has turned on Apple and today we are going to discuss the current landscape of phones, app stores, and everything else that it seems all the tech p…
…
continue reading
1
104. Salesforce & AI from the trenches | Robert Söesemann
36:55
36:55
Play later
Play later
Lists
Like
Liked
36:55
Robert Söesemann, who joins to share about Salesforce & AI from the trenches, is a Salesforce principle architect, and Salesforce MVP. Main Points Links Video Teaser The post 104. Salesforce & AI from the trenches | Robert Söesemann appeared first on SalesforceWay.By Xi Xiao
…
continue reading
In this episode, Andy and Adam discuss the importance of VDI (Virtual Desktop Infrastructure) in security and enterprise architecture. They highlight the security benefits of VDI, such as separating end user environments from the underlying physical hardware, centralized management of baseline images and patches, and the ability to keep sensitive d…
…
continue reading
1
Entra Follow-up, Helpdesk Security, Certifications
33:31
33:31
Play later
Play later
Lists
Like
Liked
33:31
In this episode, Andy and Adam clarify some points from the previous episode and discuss two main topics: mitigating social engineering attacks on IT help desks and the value of certifications in cybersecurity. They provide practical tips for securing IT help desks, such as requiring callbacks, video verifications, and supervisor verification. They…
…
continue reading
1
From AutoCAD to ArchiCAD: Unleashing Collaborative Creativity in Architecture
42:54
42:54
Play later
Play later
Lists
Like
Liked
42:54
Read the article and visit our website.By Boris Rapoport and Alex Osenenko
…
continue reading
1
Cutting Edge Tech and How it Applies to the Enterprise Worker - Guest Justin Griffith, StayLinked
52:31
52:31
Play later
Play later
Lists
Like
Liked
52:31
StayLinked CTO, Justin Griffith joins Brett Cooper to discuss 10 cutting edge technologies and trends in the enterprise, and how it applies to the enterprise worker in warehouses, retail, logistics or other frontline workforce situations.By BlueFletch
…
continue reading
1
Episode 360: Tim Perfitt on XCreds 4.0
1:29:56
1:29:56
Play later
Play later
Lists
Like
Liked
1:29:56
Tim Perfitt is back to talk about animal husbandry and the best new features that are in XCreds 4.0! Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Tim Perfitt - LinkedIn Links: https://twocanoes.com/products/mac/xcreds/ https://twocanoes.com/knowledge-base/whats-new-in-xcreds-4-0/ htt…
…
continue reading
In this episode of the Blue Security Podcast, Andy Jaw and Adam Brewer discuss two main topics: the importance of managed devices for improving security posture and the bundling of security solutions in Microsoft licensing. They highlight the shift towards requiring Intune and Azure AD joined devices for improved device management and security. The…
…
continue reading
1
Standardization of Colon Resection for Cancer: An Overview of the American College of Surgeons Commission on Cancer Standard 5.6
16:59
16:59
Play later
Play later
Lists
Like
Liked
16:59
Rick Greene, MD, discusses with Anthony Villano, MD, a review the American College of Surgeons Commission on Cancer Standard 5.6, which pertains to curative intent colon resections performed for cancer. Dr. Villano is author of "Standardization of Colon Resection for Cancer: An Overview of the American College of Surgeons Commission on Cancer Stand…
…
continue reading
1
Episode 359: Mac@Cisco - A Mac Admins Perspective
1:23:28
1:23:28
Play later
Play later
Lists
Like
Liked
1:23:28
Most of us will have seen or heard about Fletcher Previn’s presentation at JNUC 2023 around the employee choice program at Cisco, and how the numbers stack up for offering the mac. This presentation, and Fletcher’s previous presentations for IBM were described from the perspective of the executives and decision makers, and you our dear listeners wi…
…
continue reading
Join our co-hosts Sean Rabbitt and Kat Garbis to unpack a common theme "good enough." With guests Marcus Ransom and Kyle Randall (Jamf Solution Engineers), unpack when “good enough is good enough” and when it is problematic.The team talks through real life scenarios about where they have found good enough to be good enough, but also problematic in …
…
continue reading
This episode of the Blue Security Podcast discusses the issue of finding logs for chats between external and internal users in Microsoft Teams. The hosts explore various methods for detecting and alerting on suspicious chats, including using KQL queries, creating workbooks, and leveraging communication compliance features. They also highlight the c…
…
continue reading
1
Episode 358: Kim Trojanowski on SupportApp
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55
In this episode we meet Kim Trojanowski and hear a little about her experience with SupportApp and finding and working with new tools. Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Guests: Kim Trojanowski - LinkedIn Links: SupportApp - https://github.com/root3nl/SupportApp 2021 SupportApp JNUC Presentation - https://www.y…
…
continue reading
1
ArchiCAD BIM Your Competitive Edge in Bidding and AI Readiness.
26:38
26:38
Play later
Play later
Lists
Like
Liked
26:38
Visit our website.By Boris Rapoport and Alex Osenenko
…
continue reading
1
Episode 357: Jordan Burnette on Transitioning From A Solo Admin To Team
1:00:50
1:00:50
Play later
Play later
Lists
Like
Liked
1:00:50
Being a solo admin is great! So is going to a larger team, where the whole is much greater than the sum of its parts. We interview Jordan Burnette about such a transition in today’s episode. Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Jordan Burnette - LinkedIn Sponsors: Kandji Koli…
…
continue reading
1
Midnight Blizzard Update, CISO Technical Skills, BEC + Automatic Attack Disruption
30:53
30:53
Play later
Play later
Lists
Like
Liked
30:53
This episode covers updates on the Midnight Blizzard attack, the role of CISOs and their technical expertise, the need for international standards in cyber warfare, and defending against business email compromise. Takeaways -Microsoft provides an update on the Midnight Blizzard attack, revealing attempts to gain unauthorized access to internal syst…
…
continue reading
1
Guide to Enterprise Single Sign-on (SSO) and Authentication
41:02
41:02
Play later
Play later
Lists
Like
Liked
41:02
Alan Lampa joins Brett Cooper of BlueFletch for a discussion into the journey of authentication technologies from their inception to the cutting-edge systems of today. Learn about: Advancements in Authentication Explore the advancements in authentication methods, including the shift from traditional password-based systems to the convenience and sec…
…
continue reading
1
Systemic Therapy for Advanced Hepatocellular Carcinoma Guideline Update
15:28
15:28
Play later
Play later
Lists
Like
Liked
15:28
Dr. John Gordan discusses the newest evidence-based guideline update from ASCO on systemic therapy for advanced hepatocellular carcinoma (HCC). He shares the updated recommendations for first-, second-, and third-line therapy for patients with Child-Pugh Class A liver disease, guidance for patients with Child-Pugh Class B liver disease. Dr. Gordan …
…
continue reading
This episode of the Blue Security Podcast covers the announcements made at Microsoft Secure, focusing on Microsoft Copilot for Security, Microsoft Security Exposure Management, and updates to Microsoft Purview and Intune. The episode also highlights the integration of Copilot with Intune and the economic study that demonstrates the increased effici…
…
continue reading
1
Vaccination of Adults with Cancer Guideline
18:22
18:22
Play later
Play later
Lists
Like
Liked
18:22
Dr. Lisa Law and Dr. Randy Taplitz share the latest evidence-based recommendations from ASCO on vaccines in adults with cancer. They discuss recommended routine preventative vaccinations, additional vaccinations and revaccinations for adults undergoing HSCT, CD19 CAR-T treatment, or B cell-depleting therapy, guidance for adults with cancer travelin…
…
continue reading
The team from Workbrew joins us this week to discuss the challenges MacAdmins face with Homebrew at their companies. We discuss ways to cut down on IT busywork while also getting ahead with your engineering and security teams with an uncompromising approach to engineering productivity and security posture. Along the way we’ll touch upon maintaining…
…
continue reading
1
Cannabis and Cannabinoids in Adults with Cancer Guideline
16:13
16:13
Play later
Play later
Lists
Like
Liked
16:13
Dr. Ilana Braun and Dr. Eric Roeland join us on the ASCO Guidelines podcast to discuss the latest evidence-based recommendations on cannabis and cannabinoids in adults with cancer. They discuss nonjudgmental patient-clinician communication, the relatively narrow cancer-related indications for which there is actionable clinical evidence for cannabis…
…
continue reading
1
Endocrine and Targeted Therapy for HR-Positive, HER2-Negative Metastatic Breast Cancer – Capivasertib-Fulvestrant: Rapid Guideline Update
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09
Dr. Angela DeMichele, Dr. Lynn Henry, and Dr. Harold Burstein present the latest breast cancer rapid recommendation update impacting two ASCO guidelines. This update focuses on the new option, capivasertib plus fulvestrant, for patients with hormone receptor-positive, HER2-negative metastatic breast cancer with activating PIK3CA or AKT1 mutations o…
…
continue reading
1
Episode 72: AutoCAD vs. ArchiCAD: 5 Reasons Architects Should Make the Switch Now
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27
Read article and watch video.By Boris Rapoport and Alex Osenenko
…
continue reading
1
FBI Internet Crimes Report and BEC Protection
25:29
25:29
Play later
Play later
Lists
Like
Liked
25:29
In this episode, the hosts discuss the FBI's 2023 internet crime report, focusing on the increase in money lost to internet crimes and the age group most vulnerable to cybercrime. They then delve into the topic of business email compromise (BEC), explaining how scammers use email to trick individuals and businesses into giving money or divulging co…
…
continue reading
1
Hepatectomy Before Primary Tumor Resection as Preferred Approach for Synchronous Liver Metastases from Rectal Cancer
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49
Rick Greene, MD, discusses with Jean-Nicolas Vauthey, MD, a comparison of different surgical approaches to synchronous liver metastases from rectal cancer and their analysis of both clinicopathological and biological tumor factors associated with completion of the reverse approach. Professor Vauthey is the senior author of, “Hepatectomy Before Prim…
…
continue reading
1
Application Allow Listing, iMessage Post Quantum
32:28
32:28
Play later
Play later
Lists
Like
Liked
32:28
Summary In this episode, Andy and Adam discuss the concept of application allow listing and the controversy surrounding the removal of Wireshark from company computers. They also delve into the announcement by Apple that iMessage is moving to post-quantum level 3 encryption, making it one of the most secure messaging apps available. The hosts highl…
…
continue reading
1
Episode 355: Arek Dreyer - Back By Popular Demand
1:16:26
1:16:26
Play later
Play later
Lists
Like
Liked
1:16:26
When polled, one of the most requested guests was one we’ve had on before, Arek Dreyer. So rather than tell Arek, what we wanted to talk about, we thought we’d hit him up for what he wanted to talk about! Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Arek Dreyer - LinkedIn Links: http…
…
continue reading
1
Therapy for Stage IV NSCLC With Driver Alterations: ASCO Living Guideline Update 2023.3 Part 2
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23
Dr. Natash Leighl and Dr. Jyoti Patel are back on the podcast to discuss the update to the living guideline on stage IV NSCLC with driver alterations. This guideline includes recommendations for first-, second-, and subsequent-line therapy for patients with driver alterations including: EGFR, ALK, ROS1, BRAFV600E, MET exon skipping mutation, RET re…
…
continue reading
1
Therapy for Stage IV NSCLC Without Driver Alterations: ASCO Living Guideline Update 2023.3 Part 1
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49
Dr. Jyoti Patel and Dr. Natasha Leighl discuss the latest full update to the stage IV NSCLC without driver alterations living guideline. This guideline addresses first-, second-, and subsequent-line therapy for patients according to their histology (squamous cell and nonsquamous cell carcinomas) and PD-L1 expression. They discuss the streamlined re…
…
continue reading
1
Edge Password Vault, SSO, Domain Admin Creds
34:43
34:43
Play later
Play later
Lists
Like
Liked
34:43
Summary In this episode, the hosts discuss the Edge password vault and its pros and cons. They highlight the ability to sync passwords to an enterprise ID and the encryption of passwords on the disk. However, they also mention limitations such as the lack of MFA support and the inability to share passwords. The conversation then shifts to best prac…
…
continue reading
Keychain is one of the best password managers on the market - especially for the money. In this episode, we chat with Cody Thomas about his research into Keychain security, where he was able to find some successes in red teaming, and where his attempts were thwarted! Hosts: Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Cody Thomas …
…
continue reading
1
Identity Market Updates: Platform SSO vs Good Old SSO We All Know
46:03
46:03
Play later
Play later
Lists
Like
Liked
46:03
Sean and Kat spend time unpacking the current landscape in identity. Platform Single Sign-on is a new update provided by Apple for identity. Sean provides an update on how we got to Platform Single-Sign-on. They unpack how SSO and Platform SSO have some similarities as well as core differences for admins to understand as they support identity as we…
…
continue reading
In this episode, Andy and Adam discuss a video demonstrating how to bypass BitLocker encryption and the mitigations that can be implemented to protect against such attacks. They emphasize the importance of information protection and how it can enhance data security. Additionally, they highlight the reorganization of the US Air Force Cyber Command, …
…
continue reading
MacAD returns to Brighton in May of 2024! We’re excited to welcome members of the organizing committee, Maxine & Liam join the podcast to talk about this year’s conference, what attendees can expect, and why you should be booking your trip. Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests…
…
continue reading
1
Episode 352: Blake Brandon from 1Password
54:19
54:19
Play later
Play later
Lists
Like
Liked
54:19
Admins face challenges with their own vaults of secrets. How do we secure/share secrets like passwords, but also those that aren’t, like SSH keys, certs, or passkeys? And what about mass deployments and IdP integrations? Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Blake Brandon - Li…
…
continue reading
1
Microsoft Sentinel Deep-Dive with Henrik Wojcik
48:28
48:28
Play later
Play later
Lists
Like
Liked
48:28
Summary In this episode, Henrik Wojcik, a Microsoft MVP, joins the hosts to discuss Microsoft Sentinel and provide a deep dive into its deployment and usage. They cover topics such as data residency and compliance considerations, separating operational logs and security logs, connectors for data ingestion, analytics rules and alert fatigue, schedul…
…
continue reading
1
Hospital Designations and Their Impact on Guideline-Concordant Care and Survival in Pancreatic Cancer. Do They Matter?
17:42
17:42
Play later
Play later
Lists
Like
Liked
17:42
Rick Greene, MD, discusses with Patricio M. Polanco, MD, an analysis of three hospital designations, as well as volume status, and their effect on the delivery of care and survival outcomes using a cancer registry database of the second largest state in the USA. Dr. Polanco is co-corresponding author of, “Hospital Designations and Their Impact on G…
…
continue reading
1
Episode 71: Upgrading IT Infrastructure for your Architecture Firm - Workstations.
19:15
19:15
Play later
Play later
Lists
Like
Liked
19:15
Explore more on our blog: ArchIT Blog.By Boris Rapoport and Alex Osenenko
…
continue reading
1
Cloudflare Hacked, Intune Suite, Apple Stolen Device Protection
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08
Summary In this episode, the hosts discuss the Cloudflare and Okta breach, the response and remediation efforts, the introduction of the Intune Suite, and the new stolen device protection feature on the iPhone. Takeaways Nation-state attackers have unlimited time to find weaknesses and exploit them, highlighting the asymmetrical nature of cybersecu…
…
continue reading
Bravas is a new offering based out of the EU, focused on the small business market. Identity and Device Management together, they’re trying something new for the SMB market. Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Guests: Yoann Gini - LinkedIn Links: Bravas - https://www.bravas.io/en/ JWT - https://jwt.io/ WebAuthN …
…
continue reading
1
Episode 350: Shyam Bhojwani on Workato for MacAdmins
1:05:30
1:05:30
Play later
Play later
Lists
Like
Liked
1:05:30
The world is a collection of not-yet-interconnected endpoints. Today, we’re going to talk to Shyam Bhojwani, Director, Business Technology & Cybersecurity on one of the ways to connect those endpoints! Hosts: Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Shyam Bhojwani - LinkedIn Links: Workato Systematic Community - Workato Sponso…
…
continue reading
Summary In this episode, the hosts discuss the midnight blizzard attack on Microsoft and the lessons that can be learned from it. They cover topics such as learning from security incidents at other organizations, the details of the attack, OAuth attacks, and OAuth security recommendations. The hosts emphasize the importance of auditing privileges, …
…
continue reading
1
Tech News Update: Broadcom & VMWare Acquisition - What Migrating To Jamf Could Look Like & What Organizations Need to Consider
40:19
40:19
Play later
Play later
Lists
Like
Liked
40:19
Sean and Kat unpack current events in the Broadcom & VMware Acquisition with guests: Veronica Batista Bernard (Competitive Intelligence) & Andrew Needham (Professional Services Engineer - EMEIA). Our co-hosts and guests talk about why Broadcom bought VMWare, what it could look like for organizations that are possibly switching to Jamf from another …
…
continue reading
1
Boosting Productivity of Frontline Workers with Mobility: Insights and Takeaways
17:13
17:13
Play later
Play later
Lists
Like
Liked
17:13
Brett Cooper and Lee DeHihns explore the findings in the recent report, “Boosting Productivity of Frontline Workers with Modern Mobility”. This report was conducted by VDC Research, surveying enterprises using mobile computing devices such as rugged Android devices for their frontline workforce. Findings discussed: Shared workforce device model for…
…
continue reading
1
X accounts hacked, 23andMe revisited, CA for Entitlement Management
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32
Summary This episode of the Blue Security Podcast discusses the recent Twitter account hacks and the importance of multifactor authentication (MFA) in protecting social media accounts. The hosts also explore the lessons learned from 23andMe's credential stuffing attack and emphasize the need for MFA in handling sensitive customer information. They …
…
continue reading
1
Episode 349: Andrew Robinson On Evaluating New Tech
1:01:54
1:01:54
Play later
Play later
Lists
Like
Liked
1:01:54
New tech comes and goes faster than ever. In today’s episode we’ll look at evaluating when it’s time to come to users with plans and/or products to help them either embrace or hold off on it, with Andrew Robinson. Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Guests: Andrew Robinson - LinkedIn Links: Set up iCloud Keychai…
…
continue reading