Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Helping you understand cyber and technology subjects in simple language.
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
The Defence Connect Podcast Network hosts a unique series of podcasts, featuring discussions with key enablers from across the Australian defence industry. The podcasts provide the perfect blend of business intelligence and insights from a range of guests, which include government officials, ADF personnel, industry stakeholders, and members of the academic community. By aligning ourselves with the ADF and the Commonwealth government, we are uniquely placed to deliver a dynamic 360° platform ...
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
The EY Academy Podcast is designed for third level students. It is a platform to provide further insight from a business perspective on what you are learning in the classroom. Professors and Lectures from colleges around the country submit questions and experts within our business answer them. Its casual, in a relaxed format and hopefully really informative. Coming soon – The EY Career Hub where we advise students on everything from what a graduate programme is to how to perform great at int ...
…
continue reading

1
DEFENCE PROPERTY PODCAST: What the SAS taught me about property investment, with Mark Donaldson VC
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39In this episode of the Defence Property Podcast, Victoria Cross recipient Mark Donaldson joins host Kane Dury to explore the parallels between service life and strategic property investment – and why calculated risk-taking is second nature for Australian Defence Force personnel. Donaldson shares how his military mindset, forged in some of the most …
…
continue reading

1
NB532: HPE Deploys AI Agents Into GreenLake; Wi-Fi 7 Drives Q1 Switch Sales
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Take a Network Break! Our Red Alert is a remote code execution vulnerability in Roundcube. On the news front, HPE announces GreenLake Intelligence, which will bring agentic AI capabilities to the HPE portfolio, Pure Storage brings cloud-like operations for on-prem storage, and Juniper Networks adds predictive analytics to its data center ops platfo…
…
continue reading

1
Tech Bytes: New From HPE Discover—Networking, AI, and More (Sponsored)
20:59
20:59
Play later
Play later
Lists
Like
Liked
20:59Today on the Tech Bytes podcast, sponsored by HPE, we get a preview of HPE Discover. We talk about networking, security, and agentic AI announcements coming out of the event. We’ll also talk about how HPE is converging network and security in its product portfolio, and HPE’s approach to AI both as a tool being... Read more »…
…
continue reading

1
PP068: Common Kubernetes Risks and What to Do About Them
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
…
continue reading
AI is already widely used for wireless network operations. On today’s show, we look at how AI and machine learning are also being applied to wireless design and site surveys. My guest is Jussi Kiviniemi, Founder and CEO of Hamina Wireless. We talk about how Hamina is developing and implementing AI tools to help designers... Read more »…
…
continue reading

1
SPOTLIGHT: Assured position, navigation, and timing data for defence – the Australian cutting edge
42:57
42:57
Play later
Play later
Lists
Like
Liked
42:57In this episode of the Defence Connect Spotlight podcast, host Liam Garman is joined by Douglas Abdiel, think tank author, Marine Corps officer and now global vice president - defence at Advanced Navigation, to explore how assured PNT is shaping the future of autonomous capability across land, sea, and air. The discussion begins by unpacking the me…
…
continue reading

1
CYBER UNCUT: OpenAI’s big defence contract, Israel and Iran square off in cyber space, AI chatbots in the ER
37:44
37:44
Play later
Play later
Lists
Like
Liked
37:44In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss military AI, cyber warfare in the Middle East, the week in cyber security, and why the Pope is coming out swinging against AI. Hollingworth and Croft kick things off with AI news, including AI tech bros earning a military commission in the efforts to build battl…
…
continue reading

1
HN786: From Intent-Based to Autonomous Ops With Cisco Crosswork and Provider Connectivity Assurance (Sponsored)
49:38
49:38
Play later
Play later
Lists
Like
Liked
49:38Service provider networks face a couple of difficult challenges: how to map service level agreements to actual network health and performance, and how to deliver service assurance to customers regardless of what happens on the network. On today’s sponsored Heavy Networking we talk with Cisco Systems about its approach to service assurance, how Cisc…
…
continue reading

1
TNO033: Maximum Impact: Leverage Your Network to Advance Your Career (Sponsored)
42:57
42:57
Play later
Play later
Lists
Like
Liked
42:57At AutoCon 3 in Prague, Scott Robohn sat down with Ernest Lefner from sponsor Gluware to talk about lessons learned throughout his career: from his early days of pulling cable to becoming Chief Product Officer at Gluware and helping to found ONUG. Ernest talks about being a continuous technology learner, and also about the need... Read more »…
…
continue reading

1
Balancing military capability and clean energy transition, with Felix Bowman-Derrick
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36In this renewable energy and environment-focused episode of the Defence Connect Podcast, senior journalist Robert Dougherty is joined by Felix Bowman-Derrick, Assistant Secretary of Environment and Engineering in the infrastructure division of the Department of Defence’s security and estate group. Bowman-Derrick holds a bachelor of environmental sc…
…
continue reading

1
TL016: When It Comes To Product Design, Don’t Trust Your Gut
39:08
39:08
Play later
Play later
Lists
Like
Liked
39:08People consistently overestimate their ability to predict whether a new product or feature will be a success. Instead of blithely going forward with a project that takes up lots of resources and yields minimal results, today’s guest says we should get our ideas into contact with external reality as quickly as possible, and maybe do... Read more »…
…
continue reading

1
N4N031: When Is It Time For a Routing Protocol?
54:39
54:39
Play later
Play later
Lists
Like
Liked
54:39If you need to route in your network, you can program static routes into all your routing-capable devices. And this can work. But at some point, you’re probably going to want to switch to a dynamic routing protocol. On today’s N Is For Networking, Ethan and Holly discuss the differences between static and dynamic routes,... Read more »…
…
continue reading

1
THE PROGRESS REPORT: From pink suits to progress – finding your place in defence industry
34:13
34:13
Play later
Play later
Lists
Like
Liked
34:13What do you do when you walk into your first defence event in your early 20s, wearing a bright pink suit … and realise you’re the only woman in the room? In the premiere of The Progress Report, Defence Connect’s Natasha Taylor sits down with Olivia Agate – president of Women’s Defence Connection and HR partner at Navantia – to unpack what it really…
…
continue reading

1
NAN094: Automate and Iterate With the NetBox Labs Community
44:56
44:56
Play later
Play later
Lists
Like
Liked
44:56On today’s show, we’re joined NetBox Labs co-founders Mark Coleman and Kris Beevers. They recount how they founded NetBox Labs and discuss its growth and how it’s being used. We also delve into the NetBox Labs community and its importance for users. And of course, there’s the ever-present AI discussion. Mark and Kris also talk... Read more »…
…
continue reading

1
PP067: Protecting Secrets With Vault and TruffleHog
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
…
continue reading
IT teams deal with technology lifecycle issues all the time–including Y2K, which enterprises across the world grappled with for years. The Epochalypse, or Year 2038 Problem, is similar. Specifically, some Linux systems’ date-time counters will go from positive to negative at a specific date in 2038, potentially wreaking havoc on embedded systems an…
…
continue reading

1
SPOTLIGHT: Expansion plans for the military aviation industry, with Babcock’s Duncan Milne and Pierre Basquin
27:33
27:33
Play later
Play later
Lists
Like
Liked
27:33In this episode of the Defence Connect Spotlight podcast, host Liam Garman is joined by Duncan Milne, managing director of aviation and critical services at Babcock Australasia, and Pierre Basquin, chief executive of aviation and CEO France at Babcock International Group, to discuss further expansion into the military aviation industry to meet cust…
…
continue reading

1
NB531: Cisco Spotlights AI, Unified Management at CLUS; Ultra Ethernet 1.0 Unveiled
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42Take a Network Break! Our Red Alert for the week is a remote code execution vulnerability in open-source XDR platform Wazuh. In tech news, we dig into several announcements from Cisco Live US including: unified management of Meraki and Catalyst gear, new switches, an AI Assistant for the Meraki dashboard, a Deep Network Model LLM,... Read more »…
…
continue reading

1
CYBER UNCUT: Hacker furries, Global ransomware targets Aussie healthcare organisations, and cyber security for farmers
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft talk about furry hacking collectives, a spree of ransomware attacks targeting Australian healthcare organisations, and good news for farmers. Hollingworth and Croft start their chat by catching up on a defacement campaign targeting a website administered by the US Depar…
…
continue reading

1
HN785: How To Take Your First Steps Into Network Automation
55:50
55:50
Play later
Play later
Lists
Like
Liked
55:50There’s an old saying that a journey of a thousand miles begins with the first step. On today’s show, we talk about taking your first step into network automation with guest Joseph Nicholson. He’s been automating at NTT Data for many years now and has some perspective to share. He’s a network engineer by trade,... Read more »…
…
continue reading

1
IPB177: Introducing the IPv6 Compatibility Checker
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:27The Hexabuild team is providing a new community resource, an IPv6 compatibility checker, for those trying to figure out IPv6 network hardware and software compatibility. It’s currently in an alpha version. We talk about what inspired it, what it does, and possible future updates. We also want to get your feedback on whether this is... Read more »…
…
continue reading

1
TNO032: Automation First: NetOps at Megaport
1:01:12
1:01:12
Play later
Play later
Lists
Like
Liked
1:01:12Today we chat with Megaport’s Mitchell Warden, Founding Engineer; and Alexis Bertholf, Global Technical Evangelist, to find out what NetOps is like at Megaport, a company that provides scalable internet connections for all types of organizations. We look at the origins of Megaport and how the company started with the intention of network automation…
…
continue reading
What shape is your network? In other words, what is its topology? On today’s episode, we discover the different types of network topologies and designs used in the enterprise, data center, and service provider networks. We cover leaf/spine, hub and spoke, point to point, mesh, and others. We also talk about how topologies affect traffic... Read mor…
…
continue reading

1
Direct from Australian Space Summit & Exhibition 2025, with Vasyl Myroshnychenko
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36In this Australian Space Summit & Exhibition 2025 episode of the Defence Connect Podcast, senior journalist Robert Dougherty is joined by ambassador of Ukraine to Australia, Vasyl Myroshnychenko. The pair discuss: Myroshnychenko’s perspectives on the ongoing conflict in Ukraine and critical support being provided by Australia to assist against Russ…
…
continue reading

1
D2DO275: WebAssembly – The Next Big Thing?
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00Is WebAssembly the next big thing? Here to help us understand what WebAssembly (WASM) is and what it can and can’t do is Michael Levan, a consultant and WASM trainer. He also dives deeper into WASM details such as hosting, security, monitoring, and the ever-present influence of AI. AdSpot: Spacelift Founded by the creator of... Read more »…
…
continue reading

1
PP066: News Roundup – NIST’s New Exploit Metric, Windows RDP Issues, Compromised Routers, and More
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
…
continue reading
A validation survey is typically used for wireless infrastructure post-installation. It compares predictions to real wireless network performance. On today’s show we chat with Joel Crane about validation survey controversies and the challenges of producing a survey whose data has integrity. We cover topics such as the perfectly green heat map, how …
…
continue reading

1
SPOTLIGHT: Managing dislocated design teams in a defence environment, with Stantec’s Tony Rogers and Louisa Bloomer
31:01
31:01
Play later
Play later
Lists
Like
Liked
31:01In this episode of the Defence Connect Spotlight podcast, host Liam Garman is joined by Tony Rogers, market leader - defence, and Louisa Bloomer, director of digital technology (Asia-Pacific) at Stantec, to discuss the complexities of managing dislocated design teams in classified defence settings. The conversation begins with a deep dive into data…
…
continue reading

1
NB530: Broadcom Hits 102.4 Tbps With Tomahawk 6; Wireshark Debuts Certificate Program
23:22
23:22
Play later
Play later
Lists
Like
Liked
23:22Take a Network Break! We start with two critical vulnerabilities: one affecting cloud versions of Cisco ISE, and the other for HPE StoreOnce. In the news, Broadcom announces the Tomahawk 6 ASIC with 102.4Tbits of bandwidth, SentinelOne suffers a self-imposed network outage, and the Wireshark Foundation announces its first-ever professional certific…
…
continue reading

1
CYBER UNCUT: Military artificial intelligence, Ukraine hacks Russia, local hacks surge, and the name game
39:43
39:43
Play later
Play later
Lists
Like
Liked
39:43In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft are joined by special guest Robert Dougherty of Defence Connect to talk about a Ukrainian hacking operation, ransomware attacks on Australian companies surge after a quiet spot, and a popular hacking forum returns. Hollingworth and Croft kick things off with Dougherty a…
…
continue reading

1
HN784: Accelerate Your Network Automation With Gluware Labs and New Ansible Collection (Sponsored)
59:07
59:07
Play later
Play later
Lists
Like
Liked
59:07Network automation is today’s topic with sponsor Gluware. Gluware provides a network automation platform that targets both network engineers and automation builders. On today’s Heavy Networking, we discuss how Gluware supports these two constituencies. We also talk about a recent product announcement, Gluware Labs. Gluware Labs includes a free Comm…
…
continue reading

1
TL015: Continuous Reinvention With Brad Maltz
46:44
46:44
Play later
Play later
Lists
Like
Liked
46:44“Reinvent or die” is an apt adage for the ever-churning technology industry. Brad Maltz joins us to share his insights on what he calls “continuous reinvention” and how that relates to his own career and why others might want to adopt this mindset. Brad is a Senior Director of AI Solutions at Dell and has... Read more »…
…
continue reading

1
N4N029: Four Goals of Network Design
1:04:17
1:04:17
Play later
Play later
Lists
Like
Liked
1:04:17Let’s explore four goals of network design: stability, speed, scalability, and security. These goals are based on Ethan’s experience designing, building, and operating networks. Network architects and design experts might have other objectives, and that’s fine, but these four goals are the basis of today’s episode. Ethan and Holly discuss why these…
…
continue reading

1
Direct from Australian Space Summit & Exhibition 2025, with Scott Morrison
24:43
24:43
Play later
Play later
Lists
Like
Liked
24:43In this Australian Space Summit & Exhibition 2025 episode of the Defence Connect Podcast, senior journalist Robert Dougherty is joined by Scott Morrison, Space Centre Australia chair and former prime minister. The pair discuss: Morrison’s keynote speech during the Australian Space Summit & Exhibition and his discussions with space industry represen…
…
continue reading

1
D2DO274: Firefly’s State of IaC Report for 2025, aka ClickOps Is a Disgrace (Sponsored)
39:23
39:23
Play later
Play later
Lists
Like
Liked
39:23Firefly is a cloud infrastructure automation platform that helps cloud teams, DevOps, SRE, platform engineering, DevSecOps, and other groups manage their entire cloud as code. Firefly helps to manage cloud complexity and produce consistent and efficient cloud platforms with code. To help Firefly better understand their customers and industry trends…
…
continue reading

1
NAN093: Network Automation – There Must Be a Better Way!
51:10
51:10
Play later
Play later
Lists
Like
Liked
51:10“There must be a better way!” is guest Bart Dorlandt’s motto, which he applies to network automation, among other things. In today’s episode, Bart shares what he’s learned about network automation, explains why he focuses on process over tools, and reflects on the importance of mentorship. Bart and Eric also discuss why even if listeners... Read mo…
…
continue reading
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
…
continue reading

1
HS105: How to Train Your Unicorn: Thoughts on Ops Architects
27:22
27:22
Play later
Play later
Lists
Like
Liked
27:22You need someone to design your operations processes–or perhaps redesign them. That’s an Ops Architect. Should you take an ops person and train them up in architecture? Or an architect and train them up in operations? Do you even have that ops/engineer/architect organizational structure – and should you? Johna and John dive into this discussion... …
…
continue reading

1
2025 UK Cyber Breaches Survey: What need to know - What you need to do
20:07
20:07
Play later
Play later
Lists
Like
Liked
20:07Business Leaders Cyber Briefing - Episode 12: Key Takeaways What You'll Learn from This Episode Trish and Tom from Cool Waters Cyber break down the 2025 Cyber Security Breaches Survey findings to help UK financial services leaders understand their current risk landscape and improve their cyber defenses. Critical Insights for Business Leaders Your R…
…
continue reading

1
NB529: HPE Debuts 8Tbps Switch with Onboard DPUs; NVIDIA Revenues Run Wild
43:17
43:17
Play later
Play later
Lists
Like
Liked
43:17Take a Network Break! We start with a Red Alert for the IBM Tivoli Monitoring Tool, which has an unpatched (as of recording time) vulnerability that could allow remote attackers to execute arbitrary code. On the news front, Salesforce ponies up $8 billion for Informatica to improve data governance capabilities, Google researchers revise estimates o…
…
continue reading

1
Tech Bytes: NetFlow Optimizer: More Insights, Less Flow Volume (Sponsored)
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25Today on the Tech Bytes podcast, we talk about how to get more out of your NetFlow records with sponsor NetFlow Logic. NetFlow’s been around for a long time, and if you’re already including flow records as part of your monitoring and management arsenal, you may think you’re extracting all the value you can from... Read more »…
…
continue reading

1
CONTESTED GROUND: Australian sentenced to 13 years in Russia, Australia and EU discuss defence pact
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02In this episode of the Contested Ground podcast, hosts Phil Tarrant, Major General (Ret’d) Dr Marcus Thompson and Liam Garman unpack the latest from Ukraine and the ongoing conflict in India-Pakistan, and how diaspora groups are expanding conflict beyond country borders. They begin the podcast discussing Australian schoolteacher Oscar Jenkins, who …
…
continue reading

1
HN783: BGP Routing Policy for Enterprise Networkers: Unpacking IRR and RPSL
54:30
54:30
Play later
Play later
Lists
Like
Liked
54:30If you participate in the public Internet by announcing your own netblocks, you should be familiar with Internet Routing Registries (IRRs) and the Routing Policy Specification Language (RPSL). These are tools that help you be a good network citizen. In a world of BGP hijacks and other problems, these tools matter more than ever. We... Read more »…
…
continue reading

1
TNO031: Attracting New Talent to Networking, Pairing Dev With NetOps, and More With Justin Ryburn
45:22
45:22
Play later
Play later
Lists
Like
Liked
45:22Total Networks Operations sits down with Justin Ryburn for a wide-ranging discussion on the state of the networking industry. Topics including how to attract new talent to network engineering and network operations; getting literate in DevOps/infrastructure tools such as GitHub, Terraform, and Python; pairing Dev and NetOps to maximize domain exper…
…
continue reading

1
CYBER UNCUT: Meta’s new AI, a bad week for legal entities in Australia, and mandatory ransomware reporting
33:14
33:14
Play later
Play later
Lists
Like
Liked
33:14In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft talk about Meta moving to use user data to train its AI, cyber attacks on local legal firms and boards, and new regulations requiring mandatory reporting of ransomware payments. Hollingworth and Croft kick things off with the news that a German data watchdog has been un…
…
continue reading

1
IPB176: How to Number Point-to-Point Links
27:46
27:46
Play later
Play later
Lists
Like
Liked
27:46Let’s chat about point-to-point links. On today’s episode we cover what should and shouldn’t be done, and discuss why following RFC’s doesn’t always get you to the right place. We dig into questions including: Don’t we just use link-local addresses for point-to-points? Shouldn’t we assign a /127, just like we do a /31 in IPv4?... Read more »…
…
continue reading
We wanted to do an episode on SD-WAN, but realized we needed to set the stage for how wide-area networking developed. That’s why today’s episode is a history lesson of the Wide Area Network (WAN). We talk about how WANs emerged, public and private WANs, how WANs connect to LANs and data centers, the care... Read more »…
…
continue reading

1
Addressing Australia’s food insecurity, with Andrew Henderson, Agsecure
34:59
34:59
Play later
Play later
Lists
Like
Liked
34:59In this episode of the Defence Connect Podcast, host Steve Kuper is joined by Agsecure's Andrew Henderson to unpack the recent Australian Strategic Policy Institute food security green paper developed by Henderson and Dr John Coyne. The pair discuss a range of topics outlined in the food security green paper, including: Food security fragility: Aus…
…
continue reading
Ubiquiti is known primarily for wireless equipment for residential and small business use, but it can be a player in the enterprise world. On today’s show, we talk with Darrell DeRosia, Sr. Director, Network & Infrastructure Services with the Memphis Grizzlies, about how he provides that connectivity for the FedExForum, home to the Memphis Grizzlie…
…
continue reading
Cloud networks aren’t like traditional data center networks, so applying a traditional network design to the cloud probably isn’t the best idea. On today’s Day Two Cloud, guest Aidan Finn guides us through significant differences between Microsoft Azure networking and on-prem data center networks. For instance, subnets don’t segment hosts, network …
…
continue reading