A gumbo of cybersecurity insights about Data Protection, Data Governance, and Data Backup
…
continue reading
We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions
…
continue reading
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
…
continue reading
Venyu Solutions Podcast (Video)
…
continue reading
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
…
continue reading
We provide email recovery, cloud backup, and data migration tools worldwide. User can also test the free demo version before purchasing the solution.
…
continue reading
Hosted by Dan Tomaszewski, The Powered Services Pro podcast is your high-voltage source for all the cutting-edge trends and electrifying information you need to supercharge your MSP. Plug into vital industry strategies and insights while diving into the hottest topics shaping the channel—whether it's tapping into new markets, leveraging advanced tools, or adopting forward-thinking strategies. Tune in to power up your MSP!
…
continue reading
Trilio Insights delves into the dynamic world of data protection and cloud-native technologies. In addition to Trilio experts, we will bring together practitioners, innovators, and visionaries to explore the evolving landscape of data protection, backup, and recovery. From unraveling the complexities of multi-cloud environments to navigating the challenges of data governance, each episode of Trilio Insights serves to share expertise and experience for Product Engineering, It Ops, Dev Ops, Ar ...
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
A show about stealing the internet.
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
…
continue reading
Welcome to Tech New Vision’s Podcast, We are a team of tech enthusiasts dedicated to bringing you the latest apps, reviews, and insights from the world of technology.
…
continue reading
Speaking in Tech: "Where Enterprise Tech meets Consumer Tech...". Speaking in Tech is hosted by Peter Smallbone, Josh Atwell and Melissa Gurney Greene. Topics include popular tech, data storage, cloud computing, networking, storage virtualization, server virtualization, backup, disaster recovery and anything else interesting in the tech world. Disclosure: Speaking in tech does not receive support directly or indirectly from vendors or guests. Vendor relationships are disclosed on the podcast.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
A new podcast that focuses on power has launched. We’ll be discussing a wide variety of interesting and helpful topics with industry experts each month, giving you an exclusive look into the power industry and beyond. Please remember to subscribe to our channel to get the latest episode updates
…
continue reading
Welcome to the eFolder Channel Chat. These short, unscripted conversations are real stories from real channel partners moderated by Ted Hulsy, VP Marketing eFolder. eFolder is a leading supplier of cloud data protection, business continuity, cloud file sync solutions, and cloud to cloud backup for MSPs, cloud service providers, system integrators, and VARs. Delivered as wholesale services to the channel, eFolder enables its partners to provide branded data protection and file sync services a ...
…
continue reading
Alternative Pakistani music and culture magazine. mosiki.co
…
continue reading
Lenovo Customer Care +1(415)547-0376 Support Phone Number Facing any problem while dealing with your Lenovo device? Want to know various services provided by Lenovo? Or Want to access Lenovo Support Service? Click here!! Lenovo Support In today’s world of cut and throw competition, any firm which is ruling the market will keep ruling till their customers were satisfied. And having a satisfied customer is only possible with two things, i.e., Good Quality Product and best Customer Support Serv ...
…
continue reading
"Hello, We are introduce to our Diamond Scientific Comapny and their product Biogas GEM™5000 With H2S | Portable Methane Detector located in cocoa, florida, in USA. Best technology in the world to measure gas Competitive pricing Service and 35+ years of experience company. The Portable Biogas Analyzer 5000 With H2S is used for The Accurate Gas Monitoring. BIOGAS 5000 Methane Detectors have A Robust, High Quality Design which can be Fitted easily And are extremely Easy To Use In Laboratory, F ...
…
continue reading
Allison Sheridan's technology geek podcast with an EVER so slight Apple bias
…
continue reading
Tune in for lively, insightful discussion of topics important to the mainframe community, from DevOps to security and staffing. 2020 & 2024 winner of the DevOps Dozen Award for Best DevOps-Related Podcast Series.
…
continue reading
The Tech Savvy Lawyer interviews Judges, Lawyers, and other professionals discussing utilizing technology in the practice of law. It may springboard an idea and help you in your own pursuit of the business we call "practicing law". Please join us for interesting conversations enjoyable at any tech skill level!
…
continue reading
Welcome to the news and podcast section of Geelong's friendliest design studio. This is the page we host our podcast on. Make sure you never miss a show by subscribing! (links are all over the page to do so.) What are your thoughts? Like to comment? Or just want to chew the cudd? then drop us a line. Make sure you check out our news for some of the latests developments!
…
continue reading
LogiCast, brought to you by Logicata, is a weekly AWS News podcast hosted by Karl Robinson, CEO and Co-Founder of Logicata, and Jon Goodall, Lead Cloud Engineer. Each week we hand-pick a selection of news articles on Amazon Web Services (AWS) - we look at what’s new, technical how-to, and business-related news articles and take a deep dive, giving commentary, opinion, and a sprinkling of humor. Please note this is the audio only version of Logicast. If you would like the video version, pleas ...
…
continue reading
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
…
continue reading
IT Support Services relied by world industry leaders. Our IT support specialist and technical support engineer can deliver IT solutions to businesses. Our Products - Managed services - Backup and disaster recovery, - Cloud computing - Sofware/system selection, - IT consulting - IT security - IT support - IT upgrades and migrations - Maintenance and monitoring - Network installation and upgrades - Server and desktop virtualisation - Server and network documentation - CargoWise EDI data entry ...
…
continue reading
We discuss different topics all across the IT landscape; spanning from Data and Information Security to Software Development and Complex Systems. We want to share our knowledge to help you understand IT better and assist in building up our community of tech wizards.
…
continue reading
…
continue reading
Welcome to "Powering SMB," the ultimate podcast dedicated to empowering small to medium-sized businesses (SMBs) with the knowledge, tools, and inspiration they need to thrive in today's competitive landscape. Hosted by XenTegra One, a leader in SMB-focused technology solutions, this podcast brings you insightful conversations with industry experts, thought leaders, and successful entrepreneurs who have mastered the art of powering SMBs to new heights. In each episode, we dive deep into the c ...
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Hashan Kodituwakku is a successful IT professional with over 15 years of progressive experience in IT services and security organizations, multiple degrees and professional development in computer services and information systems, deep knowledge of programming languages and operating systems, and an excellent record of work in infrastructure, software development and security systems
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
This video podcast offers sample trailers of recorded presentations from recent Gartner Events. At Gartner Events, information technology experts provide raw insight, strategy, advice and research in a conference environment. Visit "gartner.com/events" to find an event that's right for you and your role. Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. We deliver the technology-related insight necessary for our clients to make the right de ...
…
continue reading
Our Define Tomorrow podcast focuses on the latest technical insights covering the modern workspace, hybrid cloud and security.
…
continue reading

1
World Backup Day: Take the Pledge to Protect Your Data
34:23
34:23
Play Later
Play Later
Lists
Like
Liked
34:23World Backup Day falls on March 31st - the day before April Fool's Day because not backing up your data is no joke. In this episode, hosts W. Curtis Preston and Prasanna Malaiyandi discuss alarming statistics about data loss and why proper backup strategies are essential for business survival. The hosts break down the famous 3-2-1 backup rule and h…
…
continue reading

1
Data Backups: The Digital Safety Deposit Box
20:04
20:04
Play Later
Play Later
Lists
Like
Liked
20:04Takeaways #Databackups are essential for business continuity. The 3-2-1 backup #strategy is crucial for data protection. Testing backup systems is necessary to ensure data recovery. Businesses should back up all critical data sets. #AI can assist in data classification for backups. Avoid keeping backups in the same location as primary data. Underst…
…
continue reading

1
Beyond Backup: Financing the Future of Data Centers
22:03
22:03
Play Later
Play Later
Lists
Like
Liked
22:03In this episode, host Ryan Karlin engages in a compelling conversation with Adam Brown, Senior Manager of Sales at Caterpillar Financial. They delve into the financial intricacies of the data center industry, highlighting key challenges such as extended lead times for grid connectivity and significant capital investments. Email us: powerbytes@cat.c…
…
continue reading

1
What runs ChatGPT, Sora, DeepSeek & Llama on Azure? (feat. Mark Russinovich)
13:06
13:06
Play Later
Play Later
Lists
Like
Liked
13:06Build and run your AI apps and agents at scale with Azure. Orchestrate multi-agent apps and high-scale inference solutions using open-source and proprietary models, no infrastructure management needed. With Azure, connect frameworks like Semantic Kernel to models from DeepSeek, Llama, OpenAI’s GPT-4o, and Sora, without provisioning GPUs or writing …
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability
6:10
6:10
Play Later
Play Later
Lists
Like
Liked
6:10Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
…
continue reading

1
Quantum Computing, AI, & Ransomware: Inside Infosecurity Europe 2025 Key Themes
26:07
26:07
Play Later
Play Later
Lists
Like
Liked
26:07Infosecurity Europe, Europe's leading cybersecurity event, is celebrating its 30th anniversary from June 3rd to 5th at ExCeL London. This year's conference is setting the stage for major moments in the enterprise tech space. The event aims to foster collaboration and promises to showcase the top cutting-edge cybersecurity solutions. In this episode…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
Play Later
Play Later
Lists
Like
Liked
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading
How do you talk to security? While at NDC Melbourne, Richard chatted with Sarah Young about her approaches to helping folks work with the security team. Often seen as an impediment to business, Sarah talks about what motivates security teams, how to use language to help them understand that you are taking security seriously, and how to get more thi…
…
continue reading

1
301: Why AI Fails Without the Right Data (And How to Fix It) – View Systems Inc.
25:37
25:37
Play Later
Play Later
Lists
Like
Liked
25:37Joel Christner, CEO of View Systems, talks about why so many enterprise AI projects fall flat—despite powerful models and high expectations. The culprit? Bad or disorganized data. Joel explains how fragmented tools, shadow IT, and poor data hygiene create major roadblocks to AI success. He shares how View Systems built a platform to solve this—stre…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection
7:13
7:13
Play Later
Play Later
Lists
Like
Liked
7:13SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
…
continue reading

1
Brute Force Attacks Unlocked: How Hackers Guess Their Way In
19:18
19:18
Play Later
Play Later
Lists
Like
Liked
19:18In this episode, we dive deep into the world of brute force attacks—one of the oldest yet still dangerously effective cyberattack methods. We unpack what brute force attacks are, how they work, and the variety of forms they take, from simple password-guessing scripts to sophisticated methods like credential stuffing, hybrid attacks, and rainbow tab…
…
continue reading

1
NC #1046 Be My Eyes at CSUN, WWDC 2024 Wishlist, Dolphin for the Visually Impaired, SD Card Speeds by Allister Jenks, Security Bits
1:30:15
1:30:15
Play Later
Play Later
Lists
Like
Liked
1:30:15PBS 180: Theming Jekyll (GitHub Pages) CSUN 2025: Be My Eyes Connects Visually Impaired with Sighted Volunteers What I Wanted from WWDC in 2024 CSUN 2025: Dolphin Computer Access for Visually Impaired SD Card Speeds — How Fast Are They Really? Support the Show Security Bits — 25 May 2025 Transcript of NC_2025_05_25 Join the Conversation: allison@po…
…
continue reading

1
301: Why AI Fails Without the Right Data (And How to Fix It) - View Systems Inc.
25:36
25:36
Play Later
Play Later
Lists
Like
Liked
25:36Joel Christner, CEO of View Systems, talks about why so many enterprise AI projects fall flat—despite powerful models and high expectations. The culprit? Bad or disorganized data. Joel explains how fragmented tools, shadow IT, and poor data hygiene create major roadblocks to AI success. He shares how View Systems built a platform to solve this—stre…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play Later
Play Later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome
6:21
6:21
Play Later
Play Later
Lists
Like
Liked
6:21New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
…
continue reading

1
Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?
30:52
30:52
Play Later
Play Later
Lists
Like
Liked
30:52“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett Ley, VP, Global Technical Sales at A10 Networks. This observation from Ley sets the stage for a crucial discussion on The Security Strategist podcast. Shubhangi Dua, podcast producer and Tech journalist at…
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity
7:51
7:51
Play Later
Play Later
Lists
Like
Liked
7:51Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
…
continue reading

1
PowerShell 7.5 and DSC 3.0.0 with Jason Helmick
36:47
36:47
Play Later
Play Later
Lists
Like
Liked
36:47What's new in PowerShell 7.5? Richard talks to Jason Helmick about the latest version of PowerShell. Jason talks about 7.5 being a version with plenty of community contributions and what that means for everyone. He also discusses 7.6, which will be released as a long-term support version of PowerShell synchronized with .NET 10. Then, on to Desired …
…
continue reading

1
New Microsoft 365 Copilot Tuning | Create fine-tuned models to write like you do
12:16
12:16
Play Later
Play Later
Lists
Like
Liked
12:16Create fine-tuned, task-specific models that write like you by teaching models using expert knowledge, tone, and structure - with reference information directly attached to the models themselves using Microsoft 365 Copilot Tuning. Fine-tuning adds new skills to foundational models, simulating experience in the tasks you teach the model to do. This …
…
continue reading

1
Season 4 Episode 20: Chips, Chaos, and Nuclear Power
49:36
49:36
Play Later
Play Later
Lists
Like
Liked
49:36In Season 4, Episode 20, Karl and Jon are joined by AWS Ambassador and Community Builder, Jenn Bergstrom for a wide-ranging discussion on key developments in cloud and infrastructure. They explore AWS CloudTrail network activity events for VPC endpoints, strategies for enhancing application resiliency using Amazon Q Developer, and how AWS security …
…
continue reading

1
300: Why Data Classification Might Be Your Biggest Security Risk – Data Management Veteran
24:08
24:08
Play Later
Play Later
Lists
Like
Liked
24:08Anand Athavale, Data Management veteran joins to explain why separating regulatory data (like PII) from security-sensitive data (like passwords and keys) is mission-critical. Learn how ransomware’s evolution has blurred roles between compliance and security, and why top-down policy, automation, and AI must reshape your data strategy now.…
…
continue reading

1
Bonus Episode: Cybersecurity Challenges Faced by Canadian Organizations
1:09:30
1:09:30
Play Later
Play Later
Lists
Like
Liked
1:09:30In this episode of the CDW Canada Tech Talks podcast, host KJ Burke discusses the findings of the 2025 CDW Canada Cybersecurity Study with cybersecurity experts Ivo Wiens and Ben Boi-Doku. They explore the evolving landscape of cybersecurity threats, the importance of continuous security testing and the challenges faced by small and medium business…
…
continue reading

1
SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise
6:41
6:41
Play Later
Play Later
Lists
Like
Liked
6:41RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
6:30
Play Later
Play Later
Lists
Like
Liked
6:30xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading

1
7 Privacy Myths People STILL Believe (do you?)
8:23
8:23
Play Later
Play Later
Lists
Like
Liked
8:23You turned off GPS and you think you can't be tracked? Perhaps you deleted a file on your computer and you think it's actually gone. These are two of many popular myths about privacy that are complete B.S. Here's what you need to know to protect yourself. Join the newsletter! https://www.allthingssecured.com/newsletter ▶ Here are 7 Cybersecurity ti…
…
continue reading

1
NC #1045 All Travelogues, QL Plus for Vets and First Responders, Lexicographical Loop, OrCam Read 5
56:32
56:32
Play Later
Play Later
Lists
Like
Liked
56:32All My Travelogues are Belong to You CSUN 2025: QL Plus Personalized Solutions for Injured Veterans Support the Show A Lexicographical Loop with 'nym' Words (Bart Busschots) CSUN 2025: OrCam Read 5 Handheld Reader Transcript of NC_2025_05_16 Join the Conversation: allison@podfeet.com podfeet.com/slack Support the Show: Patreon Donation Apple Pay or…
…
continue reading

1
Automating Mainframe Operations: Smarter, Simpler, Stronger
19:36
19:36
Play Later
Play Later
Lists
Like
Liked
19:36BMC Senior Solution Engineer Steven Dzikowski, Senior Principal Solution Engineer Gilles Robert, and Principal Product Manager Paul Spicer discuss the critical role of automation in modern mainframe operations, addressing workforce challenges, the integration of automation with IT practices, and the future of automation with AI and machine learning…
…
continue reading

1
The Never-Ending Chess Game in Personnel Security
27:55
27:55
Play Later
Play Later
Lists
Like
Liked
27:55Takeaways #Personnelsecurity is crucial for organisations and individuals. There is a significant talent shortage in the #cybersecurityindustry. #AI can enhance security measures but cannot replace human instinct. Outsourcing security functions can be beneficial for smaller organisations. The pressure on cybersecurity roles is immense and can lead …
…
continue reading

1
Beyond The App Store: Cloud Marketplace Security
27:26
27:26
Play Later
Play Later
Lists
Like
Liked
27:26Takeaways #Cloudmarketplaces function like a digital mall for various services. Continuous monitoring and detection of threats are essential. Legislation like NIST 2 and Dora impacts cloud security practices. Zero trust methodology is advised in securing cloud connections. Regular penetration testing and vulnerability management are necessary. Data…
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress
6:26
6:26
Play Later
Play Later
Lists
Like
Liked
6:26Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
…
continue reading

1
DDoS Demystified: Understanding the Threat
24:38
24:38
Play Later
Play Later
Lists
Like
Liked
24:38Takeaways #DDoS can mimic legitimate traffic, making detection difficult. #Botnets are often created from compromised IoT devices. Motivations for DDoS attacks range from hacktivism to personal grievances. Residential IP proxy networks complicate DDoS defense. #AI is increasingly being used in both attacks and defenses. The future of cybersecurity …
…
continue reading

1
SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches
6:16
6:16
Play Later
Play Later
Lists
Like
Liked
6:16Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
…
continue reading

1
Season 4 Episode 19: AI Agents, Responsible AI Adoption, and Cloud Earnings
50:06
50:06
Play Later
Play Later
Lists
Like
Liked
50:06In Season 4, Episode 19, Karl and Jon are joined by Rob Pankow, Simplyblock CEO, to discuss the new AWS EBS snapshot acceleration feature, the evolution of AI agents, AWS’s guide for responsible AI adoption in financial services, and how to use Amazon Q Business to gain insights from AWS Trusted Advisor. They also touch on cloud hyperscaler earning…
…
continue reading

1
SANS Stormcast Wednesday, May 14th: Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products
6:38
6:38
Play Later
Play Later
Lists
Like
Liked
6:38Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
…
continue reading
Active Directory is 25 years old - are you still managing it like it's 1999? Richard talks to Liz Tesch about her excellent blog post on the subject and the challenge many sysadmins have with Active Directory today. Liz talks about how WAN bandwidth was a concern in the early 2000s, so we organized Active Directory into Organizational Units to mini…
…
continue reading

1
🎙️ Ep. 111: Empowering Attorneys With AI: A Conversation with Hilary Bowman, Co-Winner of the 2025 ABA Startup Alley Competition.
19:32
19:32
Play Later
Play Later
Lists
Like
Liked
19:32Our next guest is Hilary Bowman, Co-Winner of the 2025 ABA Startup Alley Competition and CEO of Querious. She shares how lawyers can use AI tools like Querious to make client interactions better and more efficient without losing their personal touch. She explains the common challenges lawyers face in client conversations that led to the creation of…
…
continue reading

1
299: Data Storage: The Unsung Hero of Every Crisis You Avoid - Infinidat
24:12
24:12
Play Later
Play Later
Lists
Like
Liked
24:12Eric Herzog, CMO of Infinidat, joins The Gumbo to break down the modern enterprise storage landscape—from ransomware resilience and AI integration to CapEx vs. OpEx tradeoffs. From why CIOs still undervalue storage in cybersecurity strategies to the real-world consequences of ignoring performance and ransomware recovery, this conversation dives dee…
…
continue reading

1
299: Data Storage: The Unsung Hero of Every Crisis You Avoid – Infinidat
24:13
24:13
Play Later
Play Later
Lists
Like
Liked
24:13Eric Herzog, CMO of Infinidat, joins The Gumbo to break down the modern enterprise storage landscape—from ransomware resilience and AI integration to CapEx vs. OpEx tradeoffs. From why CIOs still undervalue storage in cybersecurity strategies to the real-world consequences of ignoring performance and ransomware recovery, this conversation dives dee…
…
continue reading