Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
Full Comment is Canada’s podcast for compelling interviews, controversial opinions and fascinating discussions. Hosted by Brian Lilley. Published by Postmedia, new episodes are released each Monday.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Unbiased political analysis the way you wish still existed. Justin Robert Young isn't here to tell you what to think, he's here to tell you who is going to win and why. www.politicspoliticspolitics.com
…
continue reading
RadioWHO Episodes
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
A great WordPress.com site
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
A podcast for the touch football community. Bit of touch chat, banter, fun and games, all served with a side of rice.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Educational sound bytes to help MSPs and their clients navigate Cyber Security. Cybersecurity maturity is a journey, don't go it alone. Interviews and guidance from fellow MSPs and other Industry experts. Our goal is Secure Outcomes and together we can make a difference. Support this podcast: https://podcasters.spotify.com/pod/show/msp1337/support
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
Spot's new podcast, “More Than a Broker,” is hosted by Spot Co-founder, Andrew Elsener. This podcast features interviews with industry experts and explores the latest trends and challenges in the freight transportation industry.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
fivestones is a Pentecostal church located in Canton, Georgia. Whether you're hungry or hurt, lonely or lost, full of questions or looking for a home, there's a place for you @fivestonesga! Connect with us! www.fivestonesga.com
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Jewish education and inspiration courtesy of Rabbi Mark N. Wildes, Founder of the Manhattan Jewish Experience (MJE). Founded in 1998, MJE is a warm and open community where millennial men and women in their 20s/30s can explore Jewish life and meet new people.
…
continue reading
1
A firewall wake up call. [Research Saturday]
23:01
23:01
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
23:01
Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unau…
…
continue reading
1
A firewall wake up call.
23:01
23:01
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
23:01
Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unau…
…
continue reading
1
The Weekly Run Down 11/8/24
26:57
26:57
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
26:57
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams, Shannon Tynes, Chris Abacon, and Daniel Acevedo discuss their week, including Halloween celebrations, media recommendations, and personal updates. They dive into the impact of documentaries on perceptions of cults, share their experiences with trick-or-treating, and eng…
…
continue reading
1
Women Voters and the Firewall That Wasn’t
16:13
16:13
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
16:13
What happened to women voters as Harris drew fewer of them than Biden in 2020? Even in pro-choice strongholds, economic concerns trumped reproductive rights. Read More: www.WhoWhatWhy.org
…
continue reading
The Democrats' hard, sobering defeat last night revealed uncomfortable truths about what a majority of Americans want from their leaders. Bradley and Chris Coffey, CEO of Tusk Strategies, zero in on their areas of expertise — New York politics, tech regulation, cryptocurrency, anti-hunger campaigns and mobile voting — and talk about where we go fro…
…
continue reading
1
Software-Defined Networking using Azure Firewall with Aidan Finn
40:05
40:05
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
40:05
How does Software-Defined Networking in Azure work? Richard chats with Aidan Finn about his experiences working with the suite of Azure networking products, including Firewall and Route Server. Aidan talks about the training available on Microsoft Learn to get up to speed with the power of Azure Firewall, including building policy rule sets. The co…
…
continue reading
1
Curbing Location Tracking
1:02:08
1:02:08
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:02:08
Our location is being tracked mercilessly today, in several ways. In the digital age, location data is among the most sensitive information we share, providing a record of our daily lives that can reveal where we live, who we associate with, and our personal routines. For app developers, marketers, and even law enforcement, this data is a goldmine …
…
continue reading
1
Democratic Early Voting Firewalls Too Small or Missing? Seven Days To Go! (with Taylor Lorenz, Gabe Fleisher and Mark Sutton)
2:18:48
2:18:48
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
2:18:48
If you would like to get 150 episodes of Politics Politics Politics for $99 please take advantage of our annual deal that ends on Halloween! By the time you hear this episode, we will have less than seven days until Election Day. Here are the metrics I am looking at… Nate Silver’s Silver Bulletin: Trump 54% to win Jon Ralston’s Nevada Early Voting …
…
continue reading
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
…
continue reading
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
…
continue reading
1
Episode 79: Firewall Follies
55:34
55:34
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
55:34
Firewalls are an often overlooked or unmanaged part of a network infrastructure. Listen as Andrew Hickman and Keelan Knox discuss what they are, why you should pay attention to them, what we've seen on incident responses, and what you need to do to secure your network. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode…
…
continue reading
zipdump and PKZIP; Am I Isolated; iOS Lock Reboot; PAN Bulletin; D-Link Vulns zipdump and pkzip records https://isc.sans.edu/diary/zipdump%20%26%20PKZIP%20Records/31428 Am I Isolated https://github.com/edera-dev/am-i-isolated Locked iPhones Reboot https://www.404media.co/police-freak-out-at-iphones-mysteriously-rebooting-themselves-locking-cops-out…
…
continue reading
1
Solution Spotlight: Rebuilding trust in the wake of tech calamities. [Special Edition]
26:37
26:37
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
26:37
In this special edition of our podcast, Simone Petrella sits down with cybersecurity luminary Alex Stamos, Chief Information Security Officer at SentinelOne, to delve into one of the most challenging years in tech history. 2024 has seen unprecedented breaches of multinational corporations, high-stakes attacks from state actors, massive data leaks, …
…
continue reading
Enjoy this special encore episode where we are joined by Chief Security Officer of Microsoft Canada Kevin Magee, he's sharing his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happen…
…
continue reading
1
8 Things I Know For Sure After The Election (with Evan Scrimshaw)
1:39:52
1:39:52
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:39:52
Much like the Trump Tax Cuts, the $99 Annual Deal for all bonus content is now permanent. Enjoy! As we sift through the multi-billion dollar wreckage of this election I’ve recruited Evan Scrimshaw to figure out what we know about this election. First, if you had a Time Machine and your only goal was to increase the vote share of the Biden or Harris…
…
continue reading
1
CISA issues urgent warning.
31:22
31:22
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
31:22
CISA issues a warning about a critical security flaw in Palo Alto Networks’ Expedition tool. A federal agency urges employees to limit phone use in response to Chinese hacking. Law enforcement is perplexed by spontaneously rebooting iPhones. A key supplier for oilfields suffers a ransomware attack. Hewlett Packard Enterprise (HPE) patches multiple …
…
continue reading
1
Canadian Cybersecurity, Open Source Risks, and AppSec Insights with Tanya Janca
35:18
35:18
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
35:18
🎙️ Tune in to the latest #CryingOutCloud episode featuring Tanya Janca, where we dive into all things cloud!Join Eden and Amitai as they welcome Tanya Janca, founder of 'We Hack Purple', and the author of 'Alice and Bob Learn Application Security'. She's seen it all—from launching AppSec programs to teaching secure coding and leading on education a…
…
continue reading
1
Canada cuts TikTok ties.
36:42
36:42
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
36:42
Canada orders ByteDance to shut down local operations. Cisco releases urgent patches for multiple vulnerabilities. SteelFox malware delivers a crypto-miner and info-stealer. North Korean campaigns pursue fake jobs and remote workers. A suspected cyber intrusion disrupts Washington state court systems. Over 200,000 customers of SelectBlinds have the…
…
continue reading
Malicious Steam Bruteforcer; Cisco and Veem Patches; ZIP file issues; File Upload Dangers; Steam Account Checker Poisoned with Infostealer https://isc.sans.edu/diary/Steam%20Account%20Checker%20Poisoned%20with%20Infostealer/31420 Cisco Ultra Reliable Wireless Backhaul Vulnerability https://www.cisco.com/site/us/en/products/networking/industrial-wir…
…
continue reading
1
Episode 80: IR Aversion, Part 1
26:53
26:53
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
26:53
'Tis the holiday season! A time for family...and breaches. Want to be cyberprepared to spoil the hacker's celebration? Listen to our 2 part series where Jonathan Kimmitt ensures your festivities are without incident. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode now at https://bit.ly/47eYPTK Listen on Apple Podcas…
…
continue reading
1
Building a Resilient Cybersecurity Pipeline Ft. Kenneth Ellington, Founder of ECA
37:28
37:28
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
37:28
In this episode of The Other Side of the Firewall podcast, Ryan Williams Sr. interviews Kenneth Ellington, founder of the Ellington Cyber Academy (ECA). They discuss Kenneth's journey in cybersecurity, his current initiatives in government contracting, and his vision for the future of ECA. Kenneth shares insights on building a pipeline of talent, t…
…
continue reading
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of the five types of social engineers Deanne Lewis encountered while tending bar, revealing how each barroom personality reflects a common cybersecurity threat. Our hosts share some follow-up from a friend of the show, JJ, who reports a rise in tech suppor…
…
continue reading
1
That’s a wrap on election day.
33:37
33:37
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
33:37
Election day wrap-up. The FBI issues a warning about cybercriminals selling government email credentials. Google issues an emergency update for Chrome. An Interpol operation nets dozens of arrests and IP takedowns. Microchip Technology disclosed $21.4 million in expenses related to a cybersecurity breach. Ransomware makes a Georgia hospital revert …
…
continue reading
1
Ep 12 Refs aren't just failed players, keeping them onside - Luke Heckendorf & Luke Saldern
1:03:30
1:03:30
Lejátszás később
Lejátszás később
Listák
Tetszik
Kedvelt
1:03:30
Highly accomplished touch footy referees Luke Heckendorf and Luke Saldern join us to talk all things from behind the whistle. From officiating and sometimes sending off family members, handling some of the most challenging players, to being dealt some great sledges. The boys shed a light on why and how they became referees and explain the pathways …
…
continue reading
Web Attack Surge; Air Fryer Privacy; Pygmy Goat Malware; Apple Vuln PoC; HPE Aruba critical vuln Insights from August Web Traffic Surge https://isc.sans.edu/forums/diary/%5BGuest%20Diary%5D%20Insights%20from%20August%20Web%20Traffic%20Surge/31408/ Talkative Air Fryer https://www.which.co.uk/policy-and-insight/article/why-is-my-air-fryer-spying-on-m…
…
continue reading