News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
Join us on Proofpoint’s Insider Insight, the podcast where we delve deep into the intricate realm of Endpoint Data Loss Prevention (DLP) and Insider Threat Management (ITM). In each episode, we unravel the complexities of safeguarding your organization's sensitive information by adopting a people-centric approach to managing insider threats. From inadvertent mistakes to malicious intent, insider threats pose a significant risk to the confidentiality and integrity of your data. This podcast i ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Young Professionals in Technology is a community that helps foster your burgeoning tech career, no matter what “age” you are.
…
continue reading
Welcome to IGEL Weekly, the podcast that explores the future of endpoint management and cloud workspaces. Hosted by XenTegra, this show dives deep into IGEL’s next-generation edge OS solutions. Discover how IGEL delivers extreme hardware cost savings, reduced operating expenses, and a more secure, streamlined platform for endpoint management across nearly any x86 device. Each week, we’ll unpack the latest industry trends, IGEL updates, and actionable insights to help you optimize your IT env ...
…
continue reading
IT talk with a healthy dose of empathy: Hosts Matt Yette & Matt Cozzolino draw on their combined 40+ years of infrastructure experience as they discuss the ever-changing technology landscape – from virtualization to storage, security to networking, and everything in between.
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
IGEL provides the next-gen edge OS for cloud workspaces. Their solutions offer you extreme CAPEX hardware cost savings, sharply reduced ongoing operating expenses, and a more secure and manageable endpoint management and control platform across nearly any x86 device. We will discuss the endpoint trends in the industry, IGEL updates, and general news. XenTegra is THE preferred IGEL partner
…
continue reading
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence, trends, news, and challenges. If you work in security or operations, or if you are a researcher, you’ll find episodes of interest.
…
continue reading
If you’re a managed security provider (MSP), managed security service provider (MSSP), virtual CISO, or a cybersecurity professional looking for insights and advice on ways to build bridges with your clients (or vice versa), look no further than Cyber for Hire | The Managed Security Podcast! Presented in partnership with MSSP Alert and ChannelE2E, Cyber for Hire, is a weekly 60-minute podcast (in two 30-minute segments) hosted by Ryan Morris, Principal Consultant at Morris Management Partner ...
…
continue reading
As part of Workplace Ninjas Netherlands, we will publish podcast recordings about several topics regarding the Workplace. These will be hosted in our live events and the recordings will be published.
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
Azure McFarlane, Ru Campbell, Femke Cornelissen, Peter Rising, & Kat Beedim talk about Microsoft 365 and Azure, and are joined each episode by a guest to talk about their journey in tech, and the challenges they have faced along the way.
…
continue reading
The RocketMSP Podcast, formerly known as MSP Webinars, is a comprehensive platform that caters to Managed Service Providers (MSPs) and the IT community. Hosted by Steve Taylor, a seasoned IT professional, the podcast serves as a knowledge exchange hub, offering a wealth of industry insights, best practices, and innovative solutions. Each episode features interviews and conversations with MSP business owners, channel vendors, and other noteworthy figures in the IT space. The podcast aims to p ...
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405
1:42:43
1:42:43
Play later
Play later
Lists
Like
Liked
1:42:43Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Hed Kovetz, Vivek Ramachandran, Rob Allen, Jason Mical, Alex Pinto, Lori Robinson - ESW #405
1:42:44
1:42:44
Play later
Play later
Lists
Like
Liked
1:42:44Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading

1
3270: AI, Health Data, and the Vision Behind Zoe's New App
43:12
43:12
Play later
Play later
Lists
Like
Liked
43:12What if the food you eat could not only affect how you feel today but also determine how many healthy years you’ll have in the future? In this episode of Tech Talks Daily, I sit down with Jonathan Wolf, the co-founder and CEO of Zoe, to explore how advanced science, AI, and data are reshaping our understanding of nutrition and health. Jonathan shar…
…
continue reading

1
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
…
continue reading

1
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly…
…
continue reading

1
Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen... - Rob Allen - SWN #474
36:47
36:47
Play later
Play later
Lists
Like
Liked
36:47Deepfake Porn Bots, Skype, dd, Venom Spider, CISA, IT Helpdesk, Rob Allen, and more on the Security Weekly News. Segment Resources: https://cybersecuritynews.com/cyber-security-company-ceo-arrested/ This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweek…
…
continue reading

1
Security in the DevOps Era: Balancing Speed and Safety
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37Ever feel like the faster you develop, the harder it gets to stay secure? You're not alone—and you're certainly not imagining things! In this episode of Cyber After Hours—Security in the DevOps Era: Balancing Speed and Safety—Paul and Evan are joined by Josh Dixon for a lively discussion that starts with relatable confessions about battling imposte…
…
continue reading
It’s all well and good to develop a technology strategy, articulate and document the strategy, and agree (supposedly) on that strategy. But what do you do when one or more of the tech teams act in apparent opposition to the strategy? John and Johna discuss why this happens and what questions you need to ask... Read more »…
…
continue reading

1
AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Vishal Gupta, Idan Plotnik - ASW #329
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
…
continue reading

1
AI Era, New Risks: How Data-Centric Security Reduces Emerging AppSec Threats - Idan Plotnik, Vishal Gupta - ASW #329
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03We catch up on news after a week of BSidesSF and RSAC Conference. Unsurprisingly, AI in all its flavors, from agentic to gen, was inescapable. But perhaps more surprising (and more unfortunate) is how much the adoption of LLMs has increased the attack surface within orgs. The news is heavy on security issues from MCPs and a novel alignment bypass a…
…
continue reading

1
OWASP broken access control (noun) [Word Notes]
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.By N2K Networks
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [OMITB]
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
…
continue reading

1
3269: Meet Frich and the Tech Driving Gen Z’s Financial Confidence
38:20
38:20
Play later
Play later
Lists
Like
Liked
38:20How do you teach financial literacy to a generation that’s grown up swiping on social media, watching crypto rise and fall, and navigating economic uncertainty before they’ve even finished university? That’s the question Aleksandra Medina set out to answer when she co-founded Frich—a social finance app built with Gen Z in mind. In this episode, I s…
…
continue reading

1
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read…
…
continue reading

1
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read…
…
continue reading

1
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read…
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405
1:42:43
1:42:43
Play later
Play later
Lists
Like
Liked
1:42:43Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading