show episodes
 
Artwork

1
Mac Admins Podcast

Mac Admins Podcast LLC

Unsubscribe
Unsubscribe
Weekly
 
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
  continue reading
 
Artwork

1
Speaking of SurgOnc

Annals of Surgical Oncology and Society of Surgical Oncology

Unsubscribe
Unsubscribe
Monthly
 
"Speaking of SurgOnc" is a podcast series brought to you by the Annals of Surgical Oncology (ASO) and the Society of Surgical Oncology(SSO). Dr. Frederick L. (Rick) Greene, ASO Deputy Editor, will explore and expand upon ideas and concepts described in articles published in the Annals of Surgical Oncology. Dr. Greene will interview authors and leading experts about topics of current importance in surgical oncology.
  continue reading
 
Artwork

1
ArchIT Design Under Influence

Boris Rapoport and Alex Osenenko

Unsubscribe
Unsubscribe
Monthly
 
The goal of this show is to help Architecture, Design, and Engineering professionals discover and implement the right technology so their teams can focus on doing their best work. We learn a lot providing IT services to AEC companies and we share that knowledge in our weekly Design Under Influence podcast and video show. You see, we feel that running an architecture firm or a design studio without focusing on utilizing technology is almost like designing under influence. Sometimes this may b ...
  continue reading
 
The podcast connecting identity and business. Each episode features an in-depth conversation with an identity management leader, focusing on industry hot topics and stories. Join Oscar Santolalla and his special guests as they discuss what’s current and what’s next for digital identity. Produced by Ubisecure.
  continue reading
 
Loading …
show series
 
In this episode, Andy and Adam discuss the growing threat of mobile device threats. They highlight the recent mass password reset and account lockout of Apple IDs and the potential for a mobile wormable event. They explore the conditions necessary for a mobile wormable attack, including the development of zero-click exploits, the abuse of contact l…
  continue reading
 
Dr. Raymond Chan and Dr. Larissa Nekhlyudov share the newest standards and practice recommendations from MASCC and ASCO on survivorship care for people with advanced or metastatic cancer. They discuss highlights of the standards across seven domains: person-centered care, coordinated and integrated care, evidence-based and comprehensive care, evalu…
  continue reading
 
Remember the ‘90s when Micrososft was the big bad wolf with their anti-competitive methods of pushing Internet Explorer at the expense of Netscape and other non-microsoft browsers? Now the eye of Sauron has turned on Apple and today we are going to discuss the current landscape of phones, app stores, and everything else that it seems all the tech p…
  continue reading
 
In this episode, Andy and Adam discuss the importance of VDI (Virtual Desktop Infrastructure) in security and enterprise architecture. They highlight the security benefits of VDI, such as separating end user environments from the underlying physical hardware, centralized management of baseline images and patches, and the ability to keep sensitive d…
  continue reading
 
In this episode, Andy and Adam clarify some points from the previous episode and discuss two main topics: mitigating social engineering attacks on IT help desks and the value of certifications in cybersecurity. They provide practical tips for securing IT help desks, such as requiring callbacks, video verifications, and supervisor verification. They…
  continue reading
 
Tim Perfitt is back to talk about animal husbandry and the best new features that are in XCreds 4.0! Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Tim Perfitt - LinkedIn Links: https://twocanoes.com/products/mac/xcreds/ https://twocanoes.com/knowledge-base/whats-new-in-xcreds-4-0/ htt…
  continue reading
 
In this episode of the Blue Security Podcast, Andy Jaw and Adam Brewer discuss two main topics: the importance of managed devices for improving security posture and the bundling of security solutions in Microsoft licensing. They highlight the shift towards requiring Intune and Azure AD joined devices for improved device management and security. The…
  continue reading
 
Rick Greene, MD, discusses with Anthony Villano, MD, a review the American College of Surgeons Commission on Cancer Standard 5.6, which pertains to curative intent colon resections performed for cancer. Dr. Villano is author of "Standardization of Colon Resection for Cancer: An Overview of the American College of Surgeons Commission on Cancer Stand…
  continue reading
 
Most of us will have seen or heard about Fletcher Previn’s presentation at JNUC 2023 around the employee choice program at Cisco, and how the numbers stack up for offering the mac. This presentation, and Fletcher’s previous presentations for IBM were described from the perspective of the executives and decision makers, and you our dear listeners wi…
  continue reading
 
Join our co-hosts Sean Rabbitt and Kat Garbis to unpack a common theme "good enough." With guests Marcus Ransom and Kyle Randall (Jamf Solution Engineers), unpack when “good enough is good enough” and when it is problematic.The team talks through real life scenarios about where they have found good enough to be good enough, but also problematic in …
  continue reading
 
This episode of the Blue Security Podcast discusses the issue of finding logs for chats between external and internal users in Microsoft Teams. The hosts explore various methods for detecting and alerting on suspicious chats, including using KQL queries, creating workbooks, and leveraging communication compliance features. They also highlight the c…
  continue reading
 
In this episode we meet Kim Trojanowski and hear a little about her experience with SupportApp and finding and working with new tools. Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Guests: Kim Trojanowski - LinkedIn Links: SupportApp - https://github.com/root3nl/SupportApp 2021 SupportApp JNUC Presentation - https://www.y…
  continue reading
 
Being a solo admin is great! So is going to a larger team, where the whole is much greater than the sum of its parts. We interview Jordan Burnette about such a transition in today’s episode. Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Jordan Burnette - LinkedIn Sponsors: Kandji Koli…
  continue reading
 
This episode covers updates on the Midnight Blizzard attack, the role of CISOs and their technical expertise, the need for international standards in cyber warfare, and defending against business email compromise. Takeaways -Microsoft provides an update on the Midnight Blizzard attack, revealing attempts to gain unauthorized access to internal syst…
  continue reading
 
Alan Lampa joins Brett Cooper of BlueFletch for a discussion into the journey of authentication technologies from their inception to the cutting-edge systems of today. Learn about: Advancements in Authentication Explore the advancements in authentication methods, including the shift from traditional password-based systems to the convenience and sec…
  continue reading
 
Dr. John Gordan discusses the newest evidence-based guideline update from ASCO on systemic therapy for advanced hepatocellular carcinoma (HCC). He shares the updated recommendations for first-, second-, and third-line therapy for patients with Child-Pugh Class A liver disease, guidance for patients with Child-Pugh Class B liver disease. Dr. Gordan …
  continue reading
 
This episode of the Blue Security Podcast covers the announcements made at Microsoft Secure, focusing on Microsoft Copilot for Security, Microsoft Security Exposure Management, and updates to Microsoft Purview and Intune. The episode also highlights the integration of Copilot with Intune and the economic study that demonstrates the increased effici…
  continue reading
 
Dr. Lisa Law and Dr. Randy Taplitz share the latest evidence-based recommendations from ASCO on vaccines in adults with cancer. They discuss recommended routine preventative vaccinations, additional vaccinations and revaccinations for adults undergoing HSCT, CD19 CAR-T treatment, or B cell-depleting therapy, guidance for adults with cancer travelin…
  continue reading
 
The team from Workbrew joins us this week to discuss the challenges MacAdmins face with Homebrew at their companies. We discuss ways to cut down on IT busywork while also getting ahead with your engineering and security teams with an uncompromising approach to engineering productivity and security posture. Along the way we’ll touch upon maintaining…
  continue reading
 
Dr. Ilana Braun and Dr. Eric Roeland join us on the ASCO Guidelines podcast to discuss the latest evidence-based recommendations on cannabis and cannabinoids in adults with cancer. They discuss nonjudgmental patient-clinician communication, the relatively narrow cancer-related indications for which there is actionable clinical evidence for cannabis…
  continue reading
 
Dr. Angela DeMichele, Dr. Lynn Henry, and Dr. Harold Burstein present the latest breast cancer rapid recommendation update impacting two ASCO guidelines. This update focuses on the new option, capivasertib plus fulvestrant, for patients with hormone receptor-positive, HER2-negative metastatic breast cancer with activating PIK3CA or AKT1 mutations o…
  continue reading
 
In this episode, the hosts discuss the FBI's 2023 internet crime report, focusing on the increase in money lost to internet crimes and the age group most vulnerable to cybercrime. They then delve into the topic of business email compromise (BEC), explaining how scammers use email to trick individuals and businesses into giving money or divulging co…
  continue reading
 
Rick Greene, MD, discusses with Jean-Nicolas Vauthey, MD, a comparison of different surgical approaches to synchronous liver metastases from rectal cancer and their analysis of both clinicopathological and biological tumor factors associated with completion of the reverse approach. Professor Vauthey is the senior author of, “Hepatectomy Before Prim…
  continue reading
 
Summary In this episode, Andy and Adam discuss the concept of application allow listing and the controversy surrounding the removal of Wireshark from company computers. They also delve into the announcement by Apple that iMessage is moving to post-quantum level 3 encryption, making it one of the most secure messaging apps available. The hosts highl…
  continue reading
 
When polled, one of the most requested guests was one we’ve had on before, Arek Dreyer. So rather than tell Arek, what we wanted to talk about, we thought we’d hit him up for what he wanted to talk about! Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Arek Dreyer - LinkedIn Links: http…
  continue reading
 
Dr. Natash Leighl and Dr. Jyoti Patel are back on the podcast to discuss the update to the living guideline on stage IV NSCLC with driver alterations. This guideline includes recommendations for first-, second-, and subsequent-line therapy for patients with driver alterations including: EGFR, ALK, ROS1, BRAFV600E, MET exon skipping mutation, RET re…
  continue reading
 
Dr. Jyoti Patel and Dr. Natasha Leighl discuss the latest full update to the stage IV NSCLC without driver alterations living guideline. This guideline addresses first-, second-, and subsequent-line therapy for patients according to their histology (squamous cell and nonsquamous cell carcinomas) and PD-L1 expression. They discuss the streamlined re…
  continue reading
 
Summary In this episode, the hosts discuss the Edge password vault and its pros and cons. They highlight the ability to sync passwords to an enterprise ID and the encryption of passwords on the disk. However, they also mention limitations such as the lack of MFA support and the inability to share passwords. The conversation then shifts to best prac…
  continue reading
 
Keychain is one of the best password managers on the market - especially for the money. In this episode, we chat with Cody Thomas about his research into Keychain security, where he was able to find some successes in red teaming, and where his attempts were thwarted! Hosts: Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Cody Thomas …
  continue reading
 
Sean and Kat spend time unpacking the current landscape in identity. Platform Single Sign-on is a new update provided by Apple for identity. Sean provides an update on how we got to Platform Single-Sign-on. They unpack how SSO and Platform SSO have some similarities as well as core differences for admins to understand as they support identity as we…
  continue reading
 
In this episode, Andy and Adam discuss a video demonstrating how to bypass BitLocker encryption and the mitigations that can be implemented to protect against such attacks. They emphasize the importance of information protection and how it can enhance data security. Additionally, they highlight the reorganization of the US Air Force Cyber Command, …
  continue reading
 
MacAD returns to Brighton in May of 2024! We’re excited to welcome members of the organizing committee, Maxine & Liam join the podcast to talk about this year’s conference, what attendees can expect, and why you should be booking your trip. Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests…
  continue reading
 
Admins face challenges with their own vaults of secrets. How do we secure/share secrets like passwords, but also those that aren’t, like SSH keys, certs, or passkeys? And what about mass deployments and IdP integrations? Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Blake Brandon - Li…
  continue reading
 
Summary In this episode, Henrik Wojcik, a Microsoft MVP, joins the hosts to discuss Microsoft Sentinel and provide a deep dive into its deployment and usage. They cover topics such as data residency and compliance considerations, separating operational logs and security logs, connectors for data ingestion, analytics rules and alert fatigue, schedul…
  continue reading
 
Rick Greene, MD, discusses with Patricio M. Polanco, MD, an analysis of three hospital designations, as well as volume status, and their effect on the delivery of care and survival outcomes using a cancer registry database of the second largest state in the USA. Dr. Polanco is co-corresponding author of, “Hospital Designations and Their Impact on G…
  continue reading
 
Summary In this episode, the hosts discuss the Cloudflare and Okta breach, the response and remediation efforts, the introduction of the Intune Suite, and the new stolen device protection feature on the iPhone. Takeaways Nation-state attackers have unlimited time to find weaknesses and exploit them, highlighting the asymmetrical nature of cybersecu…
  continue reading
 
Bravas is a new offering based out of the EU, focused on the small business market. Identity and Device Management together, they’re trying something new for the SMB market. Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Guests: Yoann Gini - LinkedIn Links: Bravas - https://www.bravas.io/en/ JWT - https://jwt.io/ WebAuthN …
  continue reading
 
The world is a collection of not-yet-interconnected endpoints. Today, we’re going to talk to Shyam Bhojwani, Director, Business Technology & Cybersecurity on one of the ways to connect those endpoints! Hosts: Charles Edge - @cedge318 Marcus Ransom - @marcusransom Guests: Shyam Bhojwani - LinkedIn Links: Workato Systematic Community - Workato Sponso…
  continue reading
 
Summary In this episode, the hosts discuss the midnight blizzard attack on Microsoft and the lessons that can be learned from it. They cover topics such as learning from security incidents at other organizations, the details of the attack, OAuth attacks, and OAuth security recommendations. The hosts emphasize the importance of auditing privileges, …
  continue reading
 
Sean and Kat unpack current events in the Broadcom & VMware Acquisition with guests: Veronica Batista Bernard (Competitive Intelligence) & Andrew Needham (Professional Services Engineer - EMEIA). Our co-hosts and guests talk about why Broadcom bought VMWare, what it could look like for organizations that are possibly switching to Jamf from another …
  continue reading
 
Brett Cooper and Lee DeHihns explore the findings in the recent report, “Boosting Productivity of Frontline Workers with Modern Mobility”. This report was conducted by VDC Research, surveying enterprises using mobile computing devices such as rugged Android devices for their frontline workforce. Findings discussed: Shared workforce device model for…
  continue reading
 
Summary This episode of the Blue Security Podcast discusses the recent Twitter account hacks and the importance of multifactor authentication (MFA) in protecting social media accounts. The hosts also explore the lessons learned from 23andMe's credential stuffing attack and emphasize the need for MFA in handling sensitive customer information. They …
  continue reading
 
New tech comes and goes faster than ever. In today’s episode we’ll look at evaluating when it’s time to come to users with plans and/or products to help them either embrace or hold off on it, with Andrew Robinson. Hosts: Tom Bridge - @tbridge@theinternet.social Charles Edge - @cedge318 Guests: Andrew Robinson - LinkedIn Links: Set up iCloud Keychai…
  continue reading
 
Loading …

Quick Reference Guide