show episodes
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
  continue reading
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
Artwork

1
Tech for Leaders

Mazars in the UK

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
  continue reading
 
The Defence Connect Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynamic 360° platform ...
  continue reading
 
Artwork

1
EY Academy

EY Ireland Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The EY Academy Podcast is designed for third level students. It is a platform to provide further insight from a business perspective on what you are learning in the classroom. Professors and Lectures from colleges around the country submit questions and experts within our business answer them. Its casual, in a relaxed format and hopefully really informative. Coming soon – The EY Career Hub where we advise students on everything from what a graduate programme is to how to perform great at int ...
  continue reading
 
Loading …
show series
 
In this episode of the Defence Property Podcast, Victoria Cross recipient Mark Donaldson joins host Kane Dury to explore the parallels between service life and strategic property investment – and why calculated risk-taking is second nature for Australian Defence Force personnel. Donaldson shares how his military mindset, forged in some of the most …
  continue reading
 
Take a Network Break! Our Red Alert is a remote code execution vulnerability in Roundcube. On the news front, HPE announces GreenLake Intelligence, which will bring agentic AI capabilities to the HPE portfolio, Pure Storage brings cloud-like operations for on-prem storage, and Juniper Networks adds predictive analytics to its data center ops platfo…
  continue reading
 
Today on the Tech Bytes podcast, sponsored by HPE, we get a preview of HPE Discover. We talk about networking, security, and agentic AI announcements coming out of the event. We’ll also talk about how HPE is converging network and security in its product portfolio, and HPE’s approach to AI both as a tool being... Read more »…
  continue reading
 
Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
  continue reading
 
AI is already widely used for wireless network operations. On today’s show, we look at how AI and machine learning are also being applied to wireless design and site surveys. My guest is Jussi Kiviniemi, Founder and CEO of Hamina Wireless. We talk about how Hamina is developing and implementing AI tools to help designers... Read more »…
  continue reading
 
In this episode of the Defence Connect Spotlight podcast, host Liam Garman is joined by Douglas Abdiel, think tank author, Marine Corps officer and now global vice president - defence at Advanced Navigation, to explore how assured PNT is shaping the future of autonomous capability across land, sea, and air. The discussion begins by unpacking the me…
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss military AI, cyber warfare in the Middle East, the week in cyber security, and why the Pope is coming out swinging against AI. Hollingworth and Croft kick things off with AI news, including AI tech bros earning a military commission in the efforts to build battl…
  continue reading
 
Service provider networks face a couple of difficult challenges: how to map service level agreements to actual network health and performance, and how to deliver service assurance to customers regardless of what happens on the network. On today’s sponsored Heavy Networking we talk with Cisco Systems about its approach to service assurance, how Cisc…
  continue reading
 
At AutoCon 3 in Prague, Scott Robohn sat down with Ernest Lefner from sponsor Gluware to talk about lessons learned throughout his career: from his early days of pulling cable to becoming Chief Product Officer at Gluware and helping to found ONUG. Ernest talks about being a continuous technology learner, and also about the need... Read more »…
  continue reading
 
In this renewable energy and environment-focused episode of the Defence Connect Podcast, senior journalist Robert Dougherty is joined by Felix Bowman-Derrick, Assistant Secretary of Environment and Engineering in the infrastructure division of the Department of Defence’s security and estate group. Bowman-Derrick holds a bachelor of environmental sc…
  continue reading
 
People consistently overestimate their ability to predict whether a new product or feature will be a success. Instead of blithely going forward with a project that takes up lots of resources and yields minimal results, today’s guest says we should get our ideas into contact with external reality as quickly as possible, and maybe do... Read more »…
  continue reading
 
If you need to route in your network, you can program static routes into all your routing-capable devices. And this can work. But at some point, you’re probably going to want to switch to a dynamic routing protocol. On today’s N Is For Networking, Ethan and Holly discuss the differences between static and dynamic routes,... Read more »…
  continue reading
 
What do you do when you walk into your first defence event in your early 20s, wearing a bright pink suit … and realise you’re the only woman in the room? In the premiere of The Progress Report, Defence Connect’s Natasha Taylor sits down with Olivia Agate – president of Women’s Defence Connection and HR partner at Navantia – to unpack what it really…
  continue reading
 
On today’s show, we’re joined NetBox Labs co-founders Mark Coleman and Kris Beevers. They recount how they founded NetBox Labs and discuss its growth and how it’s being used. We also delve into the NetBox Labs community and its importance for users. And of course, there’s the ever-present AI discussion. Mark and Kris also talk... Read more »…
  continue reading
 
Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
  continue reading
 
IT teams deal with technology lifecycle issues all the time–including Y2K, which enterprises across the world grappled with for years. The Epochalypse, or Year 2038 Problem, is similar. Specifically, some Linux systems’ date-time counters will go from positive to negative at a specific date in 2038, potentially wreaking havoc on embedded systems an…
  continue reading
 
In this episode of the Defence Connect Spotlight podcast, host Liam Garman is joined by Duncan Milne, managing director of aviation and critical services at Babcock Australasia, and Pierre Basquin, chief executive of aviation and CEO France at Babcock International Group, to discuss further expansion into the military aviation industry to meet cust…
  continue reading
 
Take a Network Break! Our Red Alert for the week is a remote code execution vulnerability in open-source XDR platform Wazuh. In tech news, we dig into several announcements from Cisco Live US including: unified management of Meraki and Catalyst gear, new switches, an AI Assistant for the Meraki dashboard, a Deep Network Model LLM,... Read more »…
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft talk about furry hacking collectives, a spree of ransomware attacks targeting Australian healthcare organisations, and good news for farmers. Hollingworth and Croft start their chat by catching up on a defacement campaign targeting a website administered by the US Depar…
  continue reading
 
There’s an old saying that a journey of a thousand miles begins with the first step. On today’s show, we talk about taking your first step into network automation with guest Joseph Nicholson. He’s been automating at NTT Data for many years now and has some perspective to share. He’s a network engineer by trade,... Read more »…
  continue reading
 
The Hexabuild team is providing a new community resource, an IPv6 compatibility checker, for those trying to figure out IPv6 network hardware and software compatibility. It’s currently in an alpha version. We talk about what inspired it, what it does, and possible future updates. We also want to get your feedback on whether this is... Read more »…
  continue reading
 
Today we chat with Megaport’s Mitchell Warden, Founding Engineer; and Alexis Bertholf, Global Technical Evangelist, to find out what NetOps is like at Megaport, a company that provides scalable internet connections for all types of organizations. We look at the origins of Megaport and how the company started with the intention of network automation…
  continue reading
 
What shape is your network? In other words, what is its topology? On today’s episode, we discover the different types of network topologies and designs used in the enterprise, data center, and service provider networks. We cover leaf/spine, hub and spoke, point to point, mesh, and others. We also talk about how topologies affect traffic... Read mor…
  continue reading
 
In this Australian Space Summit & Exhibition 2025 episode of the Defence Connect Podcast, senior journalist Robert Dougherty is joined by ambassador of Ukraine to Australia, Vasyl Myroshnychenko. The pair discuss: Myroshnychenko’s perspectives on the ongoing conflict in Ukraine and critical support being provided by Australia to assist against Russ…
  continue reading
 
Is WebAssembly the next big thing? Here to help us understand what WebAssembly (WASM) is and what it can and can’t do is Michael Levan, a consultant and WASM trainer. He also dives deeper into WASM details such as hosting, security, monitoring, and the ever-present influence of AI. AdSpot: Spacelift Founded by the creator of... Read more »…
  continue reading
 
Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
  continue reading
 
A validation survey is typically used for wireless infrastructure post-installation. It compares predictions to real wireless network performance. On today’s show we chat with Joel Crane about validation survey controversies and the challenges of producing a survey whose data has integrity. We cover topics such as the perfectly green heat map, how …
  continue reading
 
In this episode of the Defence Connect Spotlight podcast, host Liam Garman is joined by Tony Rogers, market leader - defence, and Louisa Bloomer, director of digital technology (Asia-Pacific) at Stantec, to discuss the complexities of managing dislocated design teams in classified defence settings. The conversation begins with a deep dive into data…
  continue reading
 
Take a Network Break! We start with two critical vulnerabilities: one affecting cloud versions of Cisco ISE, and the other for HPE StoreOnce. In the news, Broadcom announces the Tomahawk 6 ASIC with 102.4Tbits of bandwidth, SentinelOne suffers a self-imposed network outage, and the Wireshark Foundation announces its first-ever professional certific…
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft are joined by special guest Robert Dougherty of Defence Connect to talk about a Ukrainian hacking operation, ransomware attacks on Australian companies surge after a quiet spot, and a popular hacking forum returns. Hollingworth and Croft kick things off with Dougherty a…
  continue reading
 
Network automation is today’s topic with sponsor Gluware. Gluware provides a network automation platform that targets both network engineers and automation builders. On today’s Heavy Networking, we discuss how Gluware supports these two constituencies. We also talk about a recent product announcement, Gluware Labs. Gluware Labs includes a free Comm…
  continue reading
 
“Reinvent or die” is an apt adage for the ever-churning technology industry. Brad Maltz joins us to share his insights on what he calls “continuous reinvention” and how that relates to his own career and why others might want to adopt this mindset. Brad is a Senior Director of AI Solutions at Dell and has... Read more »…
  continue reading
 
Let’s explore four goals of network design: stability, speed, scalability, and security. These goals are based on Ethan’s experience designing, building, and operating networks. Network architects and design experts might have other objectives, and that’s fine, but these four goals are the basis of today’s episode. Ethan and Holly discuss why these…
  continue reading
 
In this Australian Space Summit & Exhibition 2025 episode of the Defence Connect Podcast, senior journalist Robert Dougherty is joined by Scott Morrison, Space Centre Australia chair and former prime minister. The pair discuss: Morrison’s keynote speech during the Australian Space Summit & Exhibition and his discussions with space industry represen…
  continue reading
 
Firefly is a cloud infrastructure automation platform that helps cloud teams, DevOps, SRE, platform engineering, DevSecOps, and other groups manage their entire cloud as code. Firefly helps to manage cloud complexity and produce consistent and efficient cloud platforms with code. To help Firefly better understand their customers and industry trends…
  continue reading
 
“There must be a better way!” is guest Bart Dorlandt’s motto, which he applies to network automation, among other things. In today’s episode, Bart shares what he’s learned about network automation, explains why he focuses on process over tools, and reflects on the importance of mentorship. Bart and Eric also discuss why even if listeners... Read mo…
  continue reading
 
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
  continue reading
 
You need someone to design your operations processes–or perhaps redesign them. That’s an Ops Architect. Should you take an ops person and train them up in architecture? Or an architect and train them up in operations? Do you even have that ops/engineer/architect organizational structure – and should you? Johna and John dive into this discussion... …
  continue reading
 
Business Leaders Cyber Briefing - Episode 12: Key Takeaways What You'll Learn from This Episode Trish and Tom from Cool Waters Cyber break down the 2025 Cyber Security Breaches Survey findings to help UK financial services leaders understand their current risk landscape and improve their cyber defenses. Critical Insights for Business Leaders Your R…
  continue reading
 
Take a Network Break! We start with a Red Alert for the IBM Tivoli Monitoring Tool, which has an unpatched (as of recording time) vulnerability that could allow remote attackers to execute arbitrary code. On the news front, Salesforce ponies up $8 billion for Informatica to improve data governance capabilities, Google researchers revise estimates o…
  continue reading
 
Today on the Tech Bytes podcast, we talk about how to get more out of your NetFlow records with sponsor NetFlow Logic. NetFlow’s been around for a long time, and if you’re already including flow records as part of your monitoring and management arsenal, you may think you’re extracting all the value you can from... Read more »…
  continue reading
 
In this episode of the Contested Ground podcast, hosts Phil Tarrant, Major General (Ret’d) Dr Marcus Thompson and Liam Garman unpack the latest from Ukraine and the ongoing conflict in India-Pakistan, and how diaspora groups are expanding conflict beyond country borders. They begin the podcast discussing Australian schoolteacher Oscar Jenkins, who …
  continue reading
 
If you participate in the public Internet by announcing your own netblocks, you should be familiar with Internet Routing Registries (IRRs) and the Routing Policy Specification Language (RPSL). These are tools that help you be a good network citizen. In a world of BGP hijacks and other problems, these tools matter more than ever. We... Read more »…
  continue reading
 
Total Networks Operations sits down with Justin Ryburn for a wide-ranging discussion on the state of the networking industry. Topics including how to attract new talent to network engineering and network operations; getting literate in DevOps/infrastructure tools such as GitHub, Terraform, and Python; pairing Dev and NetOps to maximize domain exper…
  continue reading
 
In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft talk about Meta moving to use user data to train its AI, cyber attacks on local legal firms and boards, and new regulations requiring mandatory reporting of ransomware payments. Hollingworth and Croft kick things off with the news that a German data watchdog has been un…
  continue reading
 
Let’s chat about point-to-point links. On today’s episode we cover what should and shouldn’t be done, and discuss why following RFC’s doesn’t always get you to the right place. We dig into questions including: Don’t we just use link-local addresses for point-to-points? Shouldn’t we assign a /127, just like we do a /31 in IPv4?... Read more »…
  continue reading
 
In this episode of the Defence Connect Podcast, host Steve Kuper is joined by Agsecure's Andrew Henderson to unpack the recent Australian Strategic Policy Institute food security green paper developed by Henderson and Dr John Coyne. The pair discuss a range of topics outlined in the food security green paper, including: Food security fragility: Aus…
  continue reading
 
Ubiquiti is known primarily for wireless equipment for residential and small business use, but it can be a player in the enterprise world. On today’s show, we talk with Darrell DeRosia, Sr. Director, Network & Infrastructure Services with the Memphis Grizzlies, about how he provides that connectivity for the FedExForum, home to the Memphis Grizzlie…
  continue reading
 
Cloud networks aren’t like traditional data center networks, so applying a traditional network design to the cloud probably isn’t the best idea. On today’s Day Two Cloud, guest Aidan Finn guides us through significant differences between Microsoft Azure networking and on-prem data center networks. For instance, subnets don’t segment hosts, network …
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play