Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Where we talk and discuss what the great firewall of China is, and the ethics of it Cover art photo provided by JJ Ying on Unsplash: https://unsplash.com/@jjying
…
continue reading
Full Comment is Canada’s podcast for compelling interviews, controversial opinions and fascinating discussions. Hosted by Brian Lilley. Published by Postmedia, new episodes are released each Monday.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Unbiased political analysis the way you wish still existed. Justin Robert Young isn't here to tell you what to think, he's here to tell you who is going to win and why. www.politicspoliticspolitics.com
…
continue reading
RadioWHO Episodes
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
A great WordPress.com site
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
A podcast for the touch football community. Bit of touch chat, banter, fun and games, all served with a side of rice.
…
continue reading
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
Spot's new podcast, “More Than a Broker,” is hosted by Spot Co-founder, Andrew Elsener. This podcast features interviews with industry experts and explores the latest trends and challenges in the freight transportation industry.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
fivestones is a Pentecostal church located in Canton, Georgia. Whether you're hungry or hurt, lonely or lost, full of questions or looking for a home, there's a place for you @fivestonesga! Connect with us! www.fivestonesga.com
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
Jewish education and inspiration courtesy of Rabbi Mark N. Wildes, Founder of the Manhattan Jewish Experience (MJE). Founded in 1998, MJE is a warm and open community where millennial men and women in their 20s/30s can explore Jewish life and meet new people.
…
continue reading
SecurityGen
…
continue reading
Welcome to "Securely Connected Everything," a dynamic podcast hosted by Michael van Rooyen (MVR), dedicated to exploring the intricate relationship between connectivity and security in the digital age. Each week, MVR welcomes guests from diverse backgrounds, to shed some light on cutting-edge technologies and methodologies that enhance digital experiences while safeguarding against potential threats. From exploring the origins and capabilities of innovative solutions, to dissecting the impli ...
…
continue reading
1
Who Is Actually Stealing Our Cybersecurity Jobs?
16:37
16:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
16:37
In this episode, the hosts discuss the latest trends in cybersecurity, focusing on the tactics employed by North Korean hackers to exploit remote job opportunities. They explore the sophistication of these cybercriminals, the implications of remote work on security, and provide recommendations for both job seekers and employers to protect against i…
…
continue reading
No, says Bradley, but in this environment of social-media-fueled anger and discontent, they have to be open to difficult feedback, be honest with themselves and voters about where they've fallen short and show people just how hard they're willing to work. Plus, Bradley floats an idea for protecting Jews around the world from attacks like the ones w…
…
continue reading
1
Cutting the Software Tether
1:03:17
1:03:17
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:03:17
Device manufacturers are breathing new life into old mundane products by connecting them to the internet, giving us the ability to monitor and control them from anywhere. However, this connection to the cloud works both ways. Not only do device makers now have unprecedented access to our usage and personal information, but they can hobble or limit …
…
continue reading
1
A firewall wake up call. [Research Saturday]
23:01
23:01
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
23:01
Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unau…
…
continue reading
Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unau…
…
continue reading
1
Women Voters and the Firewall That Wasn’t
16:13
16:13
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
16:13
What happened to women voters as Harris drew fewer of them than Biden in 2020? Even in pro-choice strongholds, economic concerns trumped reproductive rights. Read More: www.WhoWhatWhy.org
…
continue reading
1
Software-Defined Networking using Azure Firewall with Aidan Finn
40:05
40:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
40:05
How does Software-Defined Networking in Azure work? Richard chats with Aidan Finn about his experiences working with the suite of Azure networking products, including Firewall and Route Server. Aidan talks about the training available on Microsoft Learn to get up to speed with the power of Azure Firewall, including building policy rule sets. The co…
…
continue reading
1
Democratic Early Voting Firewalls Too Small or Missing? Seven Days To Go! (with Taylor Lorenz, Gabe Fleisher and Mark Sutton)
2:18:48
2:18:48
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
2:18:48
If you would like to get 150 episodes of Politics Politics Politics for $99 please take advantage of our annual deal that ends on Halloween! By the time you hear this episode, we will have less than seven days until Election Day. Here are the metrics I am looking at… Nate Silver’s Silver Bulletin: Trump 54% to win Jon Ralston’s Nevada Early Voting …
…
continue reading
1
next generation firewall (noun) [Word Notes]
7:27
7:27
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:27
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
…
continue reading
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
…
continue reading
Firewalls are an often overlooked or unmanaged part of a network infrastructure. Listen as Andrew Hickman and Keelan Knox discuss what they are, why you should pay attention to them, what we've seen on incident responses, and what you need to do to secure your network. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode…
…
continue reading
1
Network Security News Summary for Wednesday November 13th, 2024
5:51
5:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
5:51
Microsoft Patch Tuesday; CISA Top Exploited Vulns; APT Embeds Malware Using Flutter Microsoft November 2024 Patch Tuesday https://isc.sans.edu/diary/Microsoft%20November%202024%20Patch%20Tuesday/31438 CISA Top Routinely Exploited Vulnerabilities https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a APT Actors Embed Malware within macO…
…
continue reading
1
SQL Server Management Studio with Erin Stellato
42:23
42:23
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
42:23
What's happening with SQL Server Management Studio? Richard chats with Erin Stellato, now at Microsoft, about the big jump coming for SSMS. Erin talks about how folks felt SSMS was a bit neglected when the reality is that there was a push to catch up with its parent codebase in Visual Studio. However, the next version of SSMS makes that jump, which…
…
continue reading
1
Which Way, Democrats? Kamala's Billion Dollar Campaign Receipts. Trump's Cabinet Picks. (with Kirk Bado and Dave Levinthal)
1:39:53
1:39:53
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:39:53
I am obsessed with how much money the Kamala Harris campaign spent. Hundreds of millions of dollars per week spent on creating a once-in-a-lifetime glittering election machine only to deliver less electoral votes than John Kerry. Some FEC reports are available but reporting on the excesses is also bubbling up. For example, Harris recreated the set …
…
continue reading
1
Ransomware as a public health crisis.
35:05
35:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
35:05
At the U.N. Anne Neuberger frames ransomware as a growing public health crisis. Amazon confirms a MOVEit-related data breach. SAP provides patches and mitigations for a variety of flaws. Researchers identify North Korean hackers embedding malware in macOS applications. Form I-9 Compliance reports a data breach impacting over 193,000 individuals. Ho…
…
continue reading
1
PP039: Securing Active Directory from a Pen Tester’s Perspective
46:36
46:36
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
46:36
Microsoft’s Active Directory and Entra ID are valuable targets for attackers because they store critical identity information. On today’s Packet Protector, we talk with penetration tester and security consultant Eric Kuehn about how he approaches compromising AD/Entra ID, common problems he sees during client engagements, quick wins for administrat…
…
continue reading
Summary In this episode, Andy and Adam discuss the challenges and strategies for securing seasonal and contingent workers using a Zero Trust approach. They emphasize the importance of managed devices, the complexities of hybrid domain joins, and explore alternative solutions such as cloud-based services. The conversation also touches on the signifi…
…
continue reading
1
secure access service edge (SASE) (noun) [Word Notes]
8:25
8:25
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:25
Enjoy this encore episode. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks.Oleh N2K Networks
…
continue reading
1
secure access service edge (SASE) (noun)
8:25
8:25
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:25
Enjoy this encore episode. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading
1
Network Security News Summary for Tuesday November 12th, 2024
6:04
6:04
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:04
PDF Phish Analysis; Mazda Vulns; Ruby SAML Vuln Details; Veeam Vuln; Fake FBI EDRs; PDF Object Streams https://isc.sans.edu/diary/PDF%20Object%20Streams/31430 Mazda Infotainment Vulnerabilities https://www.zerodayinitiative.com/blog/2024/11/7/multiple-vulnerabilities-in-the-mazda-in-vehicle-infotainment-ivi-system Ruby SAML CVE-2024-45409: As bad a…
…
continue reading
1
Belong. Believe. Become. - Week Two
52:00
52:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
52:00
Join us for week two of Pastor Ryan Smith's new series!
…
continue reading
1
Will The Election Cause Cybersecurity Change?
12:41
12:41
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
12:41
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Daniel Acevedo discuss the potential candidates for top cybersecurity policy roles in the Trump administration. They explore the qualifications of these candidates, express concerns about certain individuals, and emphasize the critical importance …
…
continue reading
1
Revenge of the normal people, from Trump to Canada
52:19
52:19
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
52:19
The presidential election came down to the clevers versus the normals, guest John Robson tells Brian this week. Those succeeding in the establishment’s ever more complicated system of official and unofficial rules around work, business, education and identity politics went for Kamala Harris. Everyone else —feeling left behind, ignored and scorned —…
…
continue reading
1
Veterans Day Special. [CSO Perspectives]
15:33
15:33
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
15:33
Rick Howard, The CyberWire’s Chief Analyst, CSO, and Senior Fellow, and the cast of the entire CyberWire team, honor our U.S. veterans on this special day. Learn more about your ad choices. Visit megaphone.fm/adchoicesOleh N2K Networks
…
continue reading
1
Network Security News Summary for Monday November 11th, 2024
5:19
5:19
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
5:19
zipdump and PKZIP; Am I Isolated; iOS Lock Reboot; PAN Bulletin; D-Link Vulns zipdump and pkzip records https://isc.sans.edu/diary/zipdump%20%26%20PKZIP%20Records/31428 Am I Isolated https://github.com/edera-dev/am-i-isolated Locked iPhones Reboot https://www.404media.co/police-freak-out-at-iphones-mysteriously-rebooting-themselves-locking-cops-out…
…
continue reading
1
Solution Spotlight: Rebuilding trust in the wake of tech calamities. [Special Edition]
26:37
26:37
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
26:37
In this special edition of our podcast, Simone Petrella sits down with cybersecurity luminary Alex Stamos, Chief Information Security Officer at SentinelOne, to delve into one of the most challenging years in tech history. 2024 has seen unprecedented breaches of multinational corporations, high-stakes attacks from state actors, massive data leaks, …
…
continue reading
1
Kevin Magee: Focus on the archer. [CSO] [Career Notes]
7:24
7:24
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:24
Enjoy this special encore episode where we are joined by Chief Security Officer of Microsoft Canada Kevin Magee, he's sharing his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happen…
…
continue reading