show episodes
 
Artwork

1
Firewall

Firewall

Unsubscribe
Unsubscribe
Mingguan+
 
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
  continue reading
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Full Comment is Canada’s podcast for compelling interviews, controversial opinions and fascinating discussions. Hosted by Brian Lilley. Published by Postmedia, new episodes are released each Monday.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Bulanan
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

Unsubscribe
Unsubscribe
Bulanan
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
HowTo Linux HD

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Bulanan
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Bulanan
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
  continue reading
 
Spot's new podcast, “More Than a Broker,” is hosted by Spot Co-founder, Andrew Elsener. This podcast features interviews with industry experts and explores the latest trends and challenges in the freight transportation industry.
  continue reading
 
Artwork

1
Network Security

University of Twente

Unsubscribe
Unsubscribe
Bulanan
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork

1
fivestones church

fivestones church

Unsubscribe
Unsubscribe
Bulanan+
 
fivestones is a Pentecostal church located in Canton, Georgia. Whether you're hungry or hurt, lonely or lost, full of questions or looking for a home, there's a place for you @fivestonesga! Connect with us! www.fivestonesga.com
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Artwork

1
Fortinet Cybersecurity Podcast

Fortinet Cybersecurity Podcast

Unsubscribe
Unsubscribe
Bulanan+
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
Artwork

1
The Wildescast

Manhattan Jewish Experience

Unsubscribe
Unsubscribe
Bulanan+
 
Jewish education and inspiration courtesy of Rabbi Mark N. Wildes, Founder of the Manhattan Jewish Experience (MJE). Founded in 1998, MJE is a warm and open community where millennial men and women in their 20s/30s can explore Jewish life and meet new people.
  continue reading
 
Welcome to "Securely Connected Everything," a dynamic podcast hosted by Michael van Rooyen (MVR), dedicated to exploring the intricate relationship between connectivity and security in the digital age. Each week, MVR welcomes guests from diverse backgrounds, to shed some light on cutting-edge technologies and methodologies that enhance digital experiences while safeguarding against potential threats. From exploring the origins and capabilities of innovative solutions, to dissecting the impli ...
  continue reading
 
Loading …
show series
 
In this episode, the hosts discuss the latest trends in cybersecurity, focusing on the tactics employed by North Korean hackers to exploit remote job opportunities. They explore the sophistication of these cybercriminals, the implications of remote work on security, and provide recommendations for both job seekers and employers to protect against i…
  continue reading
 
No, says Bradley, but in this environment of social-media-fueled anger and discontent, they have to be open to difficult feedback, be honest with themselves and voters about where they've fallen short and show people just how hard they're willing to work. Plus, Bradley floats an idea for protecting Jews around the world from attacks like the ones w…
  continue reading
 
Device manufacturers are breathing new life into old mundane products by connecting them to the internet, giving us the ability to monitor and control them from anywhere. However, this connection to the cloud works both ways. Not only do device makers now have unprecedented access to our usage and personal information, but they can hobble or limit …
  continue reading
 
Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unau…
  continue reading
 
Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unau…
  continue reading
 
How does Software-Defined Networking in Azure work? Richard chats with Aidan Finn about his experiences working with the suite of Azure networking products, including Firewall and Route Server. Aidan talks about the training available on Microsoft Learn to get up to speed with the power of Azure Firewall, including building policy rule sets. The co…
  continue reading
 
If you would like to get 150 episodes of Politics Politics Politics for $99 please take advantage of our annual deal that ends on Halloween! By the time you hear this episode, we will have less than seven days until Election Day. Here are the metrics I am looking at… Nate Silver’s Silver Bulletin: Trump 54% to win Jon Ralston’s Nevada Early Voting …
  continue reading
 
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
  continue reading
 
Please enjoy this encore episode of Word Notes. A layer seven security orchestration platform deployed at the boundary between internal workloads slash data storage and untrusted sources that blocks incoming and outgoing network traffic with rules that tie applications to the authenticated user and provides most of the traditional security stack fu…
  continue reading
 
Firewalls are an often overlooked or unmanaged part of a network infrastructure. Listen as Andrew Hickman and Keelan Knox discuss what they are, why you should pay attention to them, what we've seen on incident responses, and what you need to do to secure your network. Watch the full video at youtube.com/@aliascybersecurity. Catch the whole episode…
  continue reading
 
Microsoft Patch Tuesday; CISA Top Exploited Vulns; APT Embeds Malware Using Flutter Microsoft November 2024 Patch Tuesday https://isc.sans.edu/diary/Microsoft%20November%202024%20Patch%20Tuesday/31438 CISA Top Routinely Exploited Vulnerabilities https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-317a APT Actors Embed Malware within macO…
  continue reading
 
What's happening with SQL Server Management Studio? Richard chats with Erin Stellato, now at Microsoft, about the big jump coming for SSMS. Erin talks about how folks felt SSMS was a bit neglected when the reality is that there was a push to catch up with its parent codebase in Visual Studio. However, the next version of SSMS makes that jump, which…
  continue reading
 
I am obsessed with how much money the Kamala Harris campaign spent. Hundreds of millions of dollars per week spent on creating a once-in-a-lifetime glittering election machine only to deliver less electoral votes than John Kerry. Some FEC reports are available but reporting on the excesses is also bubbling up. For example, Harris recreated the set …
  continue reading
 
At the U.N. Anne Neuberger frames ransomware as a growing public health crisis. Amazon confirms a MOVEit-related data breach. SAP provides patches and mitigations for a variety of flaws. Researchers identify North Korean hackers embedding malware in macOS applications. Form I-9 Compliance reports a data breach impacting over 193,000 individuals. Ho…
  continue reading
 
Microsoft’s Active Directory and Entra ID are valuable targets for attackers because they store critical identity information. On today’s Packet Protector, we talk with penetration tester and security consultant Eric Kuehn about how he approaches compromising AD/Entra ID, common problems he sees during client engagements, quick wins for administrat…
  continue reading
 
Summary In this episode, Andy and Adam discuss the challenges and strategies for securing seasonal and contingent workers using a Zero Trust approach. They emphasize the importance of managed devices, the complexities of hybrid domain joins, and explore alternative solutions such as cloud-based services. The conversation also touches on the signifi…
  continue reading
 
Enjoy this encore episode. A security architecture that incorporates the cloud shared responsibility model, a vendor provided security stack, an SD-WAN abstraction layer, and network peering with one or more of the big content providers and their associated fiber networks. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
PDF Phish Analysis; Mazda Vulns; Ruby SAML Vuln Details; Veeam Vuln; Fake FBI EDRs; PDF Object Streams https://isc.sans.edu/diary/PDF%20Object%20Streams/31430 Mazda Infotainment Vulnerabilities https://www.zerodayinitiative.com/blog/2024/11/7/multiple-vulnerabilities-in-the-mazda-in-vehicle-infotainment-ivi-system Ruby SAML CVE-2024-45409: As bad a…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, hosts Ryan Williams Sr., Shannon Tynes, and Daniel Acevedo discuss the potential candidates for top cybersecurity policy roles in the Trump administration. They explore the qualifications of these candidates, express concerns about certain individuals, and emphasize the critical importance …
  continue reading
 
The presidential election came down to the clevers versus the normals, guest John Robson tells Brian this week. Those succeeding in the establishment’s ever more complicated system of official and unofficial rules around work, business, education and identity politics went for Kamala Harris. Everyone else —feeling left behind, ignored and scorned —…
  continue reading
 
zipdump and PKZIP; Am I Isolated; iOS Lock Reboot; PAN Bulletin; D-Link Vulns zipdump and pkzip records https://isc.sans.edu/diary/zipdump%20%26%20PKZIP%20Records/31428 Am I Isolated https://github.com/edera-dev/am-i-isolated Locked iPhones Reboot https://www.404media.co/police-freak-out-at-iphones-mysteriously-rebooting-themselves-locking-cops-out…
  continue reading
 
In this special edition of our podcast, Simone Petrella sits down with cybersecurity luminary Alex Stamos, Chief Information Security Officer at SentinelOne, to delve into one of the most challenging years in tech history. 2024 has seen unprecedented breaches of multinational corporations, high-stakes attacks from state actors, massive data leaks, …
  continue reading
 
Enjoy this special encore episode where we are joined by Chief Security Officer of Microsoft Canada Kevin Magee, he's sharing his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happen…
  continue reading
 
Loading …

Panduan Rujukan Pantas

Podcast Teratas