מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
…
continue reading
Welcome to Your Network’s Edge by RAD, where innovation meets connectivity. This podcast highlights how RAD’s technologies are empowering businesses and service providers. In every episode, we provide in-depth insights into the world of IoT, 5G, network Edge, and AI-powered networking, showcasing how RAD’s solutions empower service providers and critical infrastructure operators to stay ahead. Whether you’re a communications service provider, an industrial IoT professional, or someone passio ...
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading

1
Bridging Worlds: How Technology Connects — or Divides — Our Communities | Guest: Lawrence Eta | Redefining Society And Technology Podcast With Marco Ciappelli
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com Title: Bridging Worlds: How Technology Connects — or Divides — Our Communities Guest: Lawrence Eta Global Digital AI Thought Leader | #1 International Best Selling Author | Keynote Speaker | TEDx Speaker | Multi-Sector Executive | Community & Smart Cities…
…
continue reading

1
PP068: Common Kubernetes Risks and What to Do About Them
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
…
continue reading

1
PP067: Protecting Secrets With Vault and TruffleHog
35:35
35:35
Play later
Play later
Lists
Like
Liked
35:35Secrets trickle out through misconfigurations, poor tooling, and rushed Git commits. Today’s guest, John Howard, joins us on Packet Protector to walk through practical secrets management with Vault and TruffleHog to help make sure you don’t expose your privates. John discusses work he’s done to build an automated process in his organization for dev…
…
continue reading

1
What Hump? Thirty Years of Cybersecurity and the Fine Art of Pretending It’s Not a Human Problem | A Musing On Society & Technology Newsletter Written By Marco Ciappelli | Read by TAPE3
9:59
9:59
Play later
Play later
Lists
Like
Liked
9:59What Hump? Thirty Years of Cybersecurity and the Fine Art of Pretending It’s Not a Human Problem A new transmission from Musing On Society and Technology Newsletter, by Marco Ciappelli June 6, 2025 A Post-Infosecurity Europe Reflection on the Strange but Predictable Ways We’ve Spent Thirty Years Pretending Cybersecurity Isn’t About People. ⸻ Once t…
…
continue reading

1
Managers talk cyber: Yifat Godiner owner @GO Direct on delivering cyber internally to CxO & board
54:35
54:35
Play later
Play later
Lists
Like
Liked
54:35הנגשת נושא הסייבר להנהלה בכירה ודירקטוריון היא נושא מורכב, נדרשות יכולות לגשר בין היעדים העסקיים של הארגון, הפערים בשפה והשינוי בתרבות הארגונית על מנת להגן על הארגון בצורה מיטבית הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו מייסד ובעלים בניאטק סייבר סקיורטי ואוונגליסט סייבר בשיחה עם יפעת גודינר הבעלים של גודירקט. יפעת משמשת כיועצת ל…
…
continue reading

1
Orly Katabi and Itay Tores about juniors trying to integrate into the high-tech and cyber market
27:11
27:11
Play later
Play later
Lists
Like
Liked
27:11הרשתות והקבוצות מלאות בפוסטים על ג'וניורים שמנסים להשתלב בשוק ההייטק בכלל והסייבר בפרט, מצב לא פשוט בשוק רווי במחפשי עבודה. הפודקאסט נולד אחרי שאורלי קטבי ואיתי טוראס פנו אלי באחד הכנסים ורצו לדבר על נושא הג'וניורים, שניהם מאוד פעילים בנושא ונראה לי טבעי שבמקום שאנחנו מדברים עם מנהלים בכירים תהיה התייחסות גם לאלו שעושים את צעדיהם הראשונים בתחום. הד…
…
continue reading

1
PP066: News Roundup – NIST’s New Exploit Metric, Windows RDP Issues, Compromised Routers, and More
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
…
continue reading
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
…
continue reading

1
Chair of Tech Committee of Board of Directors @Clalit Health Services on cyber in detractor's eyes
43:57
43:57
Play later
Play later
Lists
Like
Liked
43:57דירקטוריונים הופכים להיות מעורבים יותר ויותר בתחומים הטכנולוגים של החברה בכלל ובסייבר בפרט, יש דירקטוריונים שלקחו את הנושא צעד קדימה ומינו ועדה טכנולוגית מקצועית שתעזור ותפקח באופן שוטף ולא תתבסס רק על דיווחים תקופתיים הדס תמם בן אברהם סגנית הדיקן במכללה האקדמית אונו ונחשון פינקו מומחה ואוונגליסט סייבר, מארחים את יעל שחם, יו"ר הועדה הטכנולוגית של ד…
…
continue reading

1
PP064: How Aviatrix Tackles Multi-Cloud Security Challenges (Sponsored)
42:51
42:51
Play later
Play later
Lists
Like
Liked
42:51Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
…
continue reading

1
Michal Shlomo Head of cyber-Insurance @Howden Insurance Brokers IL on insurance role & cyber attack
43:58
43:58
Play later
Play later
Lists
Like
Liked
43:58אחת המחלוקות הגדולות בין אנשי המקצוע בסייבר היא נושא ביטוח הסייבר. כן צריך, לא צריך, האם המוצר הביטוחי מצדיק את ההוצאה והאם הוא נותן פתרון אמיתי בזמן משבר. הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו יועץ ואוונגליסט סייבר מארחים את מיכל שלמה ראש מחלקת ביטוחי סייבר בסוכנות הביטוח האודן, בשיחה על ביטוחי סייבר ומה האמת למול השמועות. ה…
…
continue reading

1
From Cassette Tapes and Phrasebooks to AI Real-Time Translations — Machines Can Now Speak for Us, But We’re Losing the Art of Understanding Each Other | A Musing On Society & Technology Newsletter Written ...
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49From Cassette Tapes and Phrasebooks to AI Real-Time Translations — Machines Can Now Speak for Us, But We’re Losing the Art of Understanding Each Other May 21, 2025 A new transmission from Musing On Society and Technology Newsletter, by Marco Ciappelli There’s this thing I’ve dreamed about since I was a kid. No, it wasn’t flying cars. Or robot butle…
…
continue reading

1
PP063: Wi-Fi Security and AI in the WLAN at Mobility Field Day
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Wireless security takes center stage in this episode of Packet Protector. Jennifer Minella and guests discuss “secure by default” efforts by WLAN vendors; the current state of PSK, SAE, and WPA3; NAC and zero trust; more WLAN vendors adding AI to their products (or at least their messaging); and more. Jennifer is joined by Jonathan... Read more »…
…
continue reading

1
Why Humanity’s Software Needs an Update in Our Hybrid World — Before the Tech Outpaces Us | Guest: Jeremy Lasman | Redefining Society And Technology Podcast With Marco Ciappelli
42:25
42:25
Play later
Play later
Lists
Like
Liked
42:25Guest: Guest: Jeremy Lasman Website: https://www.jeremylasman.com LinkedIn: https://www.linkedin.com/in/jeremylasman _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society & Technology Podcast Visit Marco's website 👉 https://www.marcociappelli.com _____________________________ …
…
continue reading

1
PP062: Hunting for Host Security and Performance Issues with Stratoshark
33:45
33:45
Play later
Play later
Lists
Like
Liked
33:45Stratoshark is a new tool from the Wireshark Foundation that analyzes system calls on a host. Network, security, and application teams can use Stratoshark to diagnose performance issues and investigate behavior that may indicate malware or other compromises of the host. On today’s Packet Protector we talk with Gerald Combs of the Wireshark Foundati…
…
continue reading

1
The Future Is a Place We Visit, But Never Stay | A Post RSAC Conference 2025 Reflection | A Musing On Society & Technology Newsletter with Marco Ciappelli and TAPE3 | Read by TAPE3
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31The Future Is a Place We Visit, But Never Stay May 9, 2025 A Post-RSAC 2025 Reflection on the Kinda Funny and Pretty Weird Ways Society, Technology, and Cybersecurity Intersect, Interact, and Often Simply Ignore Each Other. By Marco Ciappelli | Musing on Society and Technology Here we are — once again, back from RSAC. Back from the future. Or at le…
…
continue reading

1
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
…
continue reading

1
Liora Shimoni former Deputy Dir. @state Comptroller Audit Division on cyber auditing
43:53
43:53
Play later
Play later
Lists
Like
Liked
43:53משרד מבקר המדינה הוא גוף הביקורת הגדול בישראל עם כמות עצומה של נושאים בהם הוא נדרש לטפל. נושא הסייבר הפך להיות נושא מהותי לאור אין ספור המתקפות כנגד גופי מדינה והניסיון להשבית מערכות של גופי ממשל, בריאות, ביטחון ועוד. עו"ד הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו אוונגליסט סייבר מארחים את ליאורה שמעוני לשעבר סגנית מבקר המדינה ומ…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with ...
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrast…
…
continue reading

1
Orit Benvenisti partner & CEO @Tigbur Group about how to build cyber culture & "raise the walls"
59:12
59:12
Play later
Play later
Lists
Like
Liked
59:12לאורך כל הריאיון היה ברור שמדובר בזן אחר של מנכ"ל עם גישה שונה, ניהול חברה המעסיקה עשרות אלפי מועסקים, כ-700 עובדי מנהלה ב-40 סניפים מחד, והרצון להבין מאידך, יוצרים תמהיל לא פשוט לכול הנהלה והעומדת בראשה. עו"ד הדס תמם בן אברהם סגנית הדיקן בקריה האקדמית אונו ונחשון פינקו אוונגליסט סייבר מארחים את אורית בנבנישתי שותפה ומנכ"ל קבוצת תיגבור בשיחה על ראי…
…
continue reading

1
PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
…
continue reading

1
Living Forever (Sort Of): AI Clones, Digital Ghosts, and the Problem with Perfection | A Carbon, a Silicon, and a Cell walk into a bar... | A Redefining Society Podcast Series With Recurring Guest Dr ...
43:23
43:23
Play later
Play later
Lists
Like
Liked
43:23Guest: Dr. Bruce Y Lee Senior Contributor @Forbes | Professor | CEO | Writer/Journalist | Entrepreneur | Digital & Computational Health | #AI | bruceylee.substack.com | bruceylee.com Bruce Y. Lee, MD, MBA is a writer, journalist, systems modeler, AI, computational and digital health expert, professor, physician, entrepreneur, and avocado-eater, not…
…
continue reading

1
IoT Meetup #4: Mati Epstein Head of IoT & ICS Tech Sales @Checkpoint on IoT Security and Enforcement
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17האם מכשירי האיי.או.טי שלך מאובטחים? אכיפה אוטומטית עם למידת מכונה מרצה: מתי אפשטיין, ראש מכירות טכנולוגיות האיי.או.טי ואיי.סי.אס , צ'ק פוינט ההרצאה זו מתמקדת באבטחת "מכשירים מחוברים" - אכיפה! בהנחה שמכשירי האיי.או.טי ואיי.סי.אס פגיעים, קלים לפריצה ומקור לתנועה רוחבית זדונית ברשתות איי.טי ואוו.טי, צ'ק פוינט יוצרת באופן אוטונומי (ואוטומטי) מדיניות אב…
…
continue reading

1
PP058: Network Discovery with NMAP: You’ve Got Swaptions
45:09
45:09
Play later
Play later
Lists
Like
Liked
45:09We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term “swaptions” as we have some fun with NMAP terminology. He also gives details on how to... Read more »…
…
continue reading

1
From Myth to Machine: When Stories Shaped Our Journey to the Stars | A Musing On Society & Technology Newsletter with Marco Ciappelli and TAPE3 | Read by TAPE3
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52🪐 From Myth to Machine: When Stories Shaped Our Journey to the Stars April 9, 2025 Before humanity launched rockets toward distant planets or placed satellites that quietly orbit our Earth, before telescopes pierced the cosmic veil to reveal distant galaxies, we looked to the night sky armed only with wonder. Beneath starlit skies, humans gathered …
…
continue reading

1
Aviv Madmon Founder and CEO @Experda about Data/AI/Cyber and everything in-between & mindset change
58:09
58:09
Play later
Play later
Lists
Like
Liked
58:09דאטה, בעולם שבו כמויות המידע מכפילות את עצמן כמעט על בסיס יומי ומשמשות אבן יסוד בהתנהלות הארגונית הצורך בכלי ניתוח הולך וגובר ומהווה לעיתים נקודת חולשה בהגנת הסייבר של הארגון. נחשון פינקו מארח את אביב מדמון מקים שותף ומנכ"ל אקספרדה בשיחה על דאטה, מאגרי מידע, כלי ניתוח ואיך לצמצם סיכונים ומשטחי תקיפה לנכס החשוב ביותר בארגון. עד כמה אנחנו מבינים את ח…
…
continue reading

1
PP057: Behind the Scenes At Cisco: PSIRT, AI, CVEs, and VEX
54:13
54:13
Play later
Play later
Lists
Like
Liked
54:13Cisco Systems has a sprawling portfolio of home-grown and acquired products. What’s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished Engineer at Cisco, gives us an inside look. We dig into how Cisco identifies security bugs using internal and external sources, the growing role of AI... …
…
continue reading

1
Guy Hochman CEO @Genie computing Services on October 7th: a scenario no Risk Management expected
59:23
59:23
Play later
Play later
Lists
Like
Liked
59:23פרק חובה לכול מנהל ואיש מקצוע בתחום מערכות המידע השביעי באוקטובר הוא הטראומה הגדולה ביותר שחוותה מדינת ישראל מאז היוסדה, רבות דובר וידובר בנושא אך יש זווית שונה של התמודדות מקצועית של חברת אינטגרציה שלקוחותיה היו הקיבוצים והתעשייה שהותקפה בעוטף עזה. איך מתמודדים עם תרחיש שלא נלקח בחשבון בשום ניהול סיכונים נחשון פינקו מארח את גיא הוכמן המנכ"ל של ג'י…
…
continue reading
On today’s show, we chat with Joe Evangelisto, CISO at NetSPI. He recounts his journey to becoming a Chief Information Security Officer, one that started as an IT sysadmin, advanced to management, and led him ultimately to the CISO role. Joe talks about building security programs from the ground up and developing both personally and... Read more »…
…
continue reading

1
PP055: News Roundup – BotNet Targets TP-Link, Threat Hunting In the Electric Grid, Apple Vs. UK Snoops, and More
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28This week we dive into security headlines including a botnet bonanza that includes TP-Link routers, Chinese attackers targeting Juniper and Fortinet, and a case study of nation-state actors penetrating the operator of a small US electric utility. We also discuss ransomware attacks targeting critical infrastructure, a backdoor in an Android variant …
…
continue reading

1
Tiko Gadot, CEO @Israel Ports Company in a conversation about cyber from the CEO point of view
1:11:51
1:11:51
Play later
Play later
Lists
Like
Liked
1:11:51איך רואה מנכ"ל את נושא הסייבר בחברה גדולה ומשמעותית המוגדרת כתשתית קריטית? עו"ד הדס תמם בן אברהם ונחשון פינקו מארחים את טיקו גדות המנכ"ל של חברת נמלי ישראל (חנ"י) בשיחה על אתגרי הסייבר מהזווית העסקית וקבלת החלטות בדרגי ההנהלה והדירקטוריון. כמה צריך להשקיע בסייבר ביטוח סייבר כן או לא איך צריכים אנשי המקצוע לשקף סייבר להנהלה ועוד How does a CEO view …
…
continue reading

1
PP054: Understanding WireGuard and Overlay VPNs with Tom Lawrence
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11WireGuard and other overlay VPNs are the focus of today’s podcast with guest Tom Lawrence from Lawrence Systems. We dig into differences between WireGuard and traditional IPSec VPNs, how WireGuard’s opinionated approach to crypto suites helps improve its performance, and how WireGuard compares to OpenVPN. We also look at the broader category of ove…
…
continue reading

1
Redefining Work in a Hybrid Society – Technology, Leadership, and the Future of Employment | Guest: Sara Daw | Redefining Society And Technology Podcast With Marco Ciappelli
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Guest: Guest: Sara Daw 👉 https://www.linkedin.com/in/saradaw 📌 Sara’s latest book, Strategy and Leadership as Service: How the Access Economy Meets the C-Suite _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society & Technology Podcast Visit Marco's website 👉 https://www.marcoc…
…
continue reading

1
PP053: Rethinking Secure Network Access and Zero Trust With Bowtie (Sponsored)
42:47
42:47
Play later
Play later
Lists
Like
Liked
42:47On today’s Packet Protector episode we talk with sponsor Bowtie about its secure network access offering. If you think secure network access is just another way to say ‘VPN,’ you’ll want to think again. Bowtie’s approach aims to provide fast, resilient connectivity while also incorporating zero trust network access, a secure Web gateway, CASB, and.…
…
continue reading

1
Managers talk cyber S1-E1: Kfir Azoulay CEO & Co-Founder @Solveo on Business Email Compromise (BEC)
51:48
51:48
Play later
Play later
Lists
Like
Liked
51:48הפרק הראשון של הפודקאסט "מנהלים מדברים סייבר" "הונאות מנהלים" היא התקפה של הנדסה חברתית דרך דואר אלקטרוני. כאשר התוקף מזייף הודעת דואר אלקטרוני כדי להערים על הקורבן לבצע פעולה כלשהי, לרוב, העברת כסף לחשבון או למיקום שבשליטת התוקף עו"ד הדס בן אברהם ונחשון פינקו מארחים את כפיר אזולאי חוקר הונאות סייבר, מנכ"ל ומייסד משותף בסולביאו בנושא הונאות מנהלים …
…
continue reading

1
LA Made: The Other Moonshot | The story of three Black aerospace engineers in Los Angeles, who played a crucial role in America’s race to space, amid the civil unrest of the 1960s | Guest: Joanne Higgins ...
38:13
38:13
Play later
Play later
Lists
Like
Liked
38:13Guest: Guest: Joanne Higgins 👉 https://laist.com/podcasts/la-made _____________________________ Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society & Technology Podcast Visit Marco's website 👉 https://www.marcociappelli.com _____________________________ This Episode’s Sponsors BlackCloak 👉 https://itspm.…
…
continue reading

1
PP052: The State of the Network Security Market In 2025
40:38
40:38
Play later
Play later
Lists
Like
Liked
40:38How big is the network security market? Is it growing? How is that growth measured? What effect is SASE having on security spending? Will security products or security operators get more effective thanks to AI? We put these and other questions to Mauricio Sanchez. He’s Sr. Director, Enterprise Security and Networking at the Dell’Oro Group, a... Rea…
…
continue reading

1
Reimagining Nostalgia: Music’s Creative and Technological Evolution | A The NAMM Show 2025 Conversation with John Mlynczak | On Location Coverage with Sean Martin and Marco Ciappelli
39:07
39:07
Play later
Play later
Lists
Like
Liked
39:07The latest On Location with Sean Martin and Marco Ciappelli episode takes listeners behind the scenes of the NAMM 2025 show, featuring a vibrant discussion with John Mlynczak, NAMM President and CEO. The conversation is not just a recap of an incredible event but a celebration of music’s enduring power and the evolving role of technology in the mus…
…
continue reading

1
PP051: Security Certifications From Beginner to Advanced
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53Certifications are a fact of life in a technical career. They can also provide a pathway to help you earn new roles, sharpen your skills, and boost your salary. On today’s Packet Protector we look at security certifications for beginners, experienced professionals, and advanced practitioners. This episode was inspired by a LinkedIn post by Ethan...…
…
continue reading

1
Human Learning Versus Artificial General Intelligence with Ananta Nair, Artificial Intelligence Engineer at Dell Technologies
50:17
50:17
Play later
Play later
Lists
Like
Liked
50:17This episode features an interview between Bill Pfeifer and Ananta Nair, Artificial Intelligence Engineer at Dell Technologies, where she leads AI and ML software initiatives for large enterprises. Ananta discusses differences between human learning and AI models, highlighting the complexities and limitations of current AI technologies. She also to…
…
continue reading

1
PP050: Understanding–and Protecting Yourself From–the Malware Economy
42:40
42:40
Play later
Play later
Lists
Like
Liked
42:40There’s a robust malware economy with an active market for exploits, brokered access to compromised systems, ransomware, bots-as-a-service, and more. And this malware economy is targeted at you. On today’s Packet Protector we talk with Jake Williams, a security researcher, consultant, and instructor, about the malware economy, how it operates, and …
…
continue reading

1
PP049: CSMM – A Practical Model for Improving Your Cloud Security
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55The Cloud Security Maturity Model (CSMM) is a practical blueprint for improving the security of your public cloud deployments. Developed in partnership with the Cloud Security Alliance, IANS, and Securosis, the model covers 12 categories, such as network security and application security, across 3 domains. It describes 5 levels of security maturity…
…
continue reading

1
The Great Australian Social Media Ban: Fixing a Broken System or Just Breaking It More? | Guest: Jacqueline Jayne (JJ) | A Redefining Society And Technology Podcast Episode Hosted By Marco Ciappelli
43:15
43:15
Play later
Play later
Lists
Like
Liked
43:15Guest: Jaqueline (JJ) Jayne JJ has worked with people and technology for over 25 years, wearing multiple hats, resulting in an enviable breadth and depth of experience, insights and knowledge. She successfully led a security awareness and training program that resulted in a strong security culture and observable behaviour change. Over the last 5-ye…
…
continue reading

1
The Evolution and Future of Data Centers with John Bonczek, Chief Revenue Officer of fifteenfortyseven Critical Systems Realty
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13How have data centers evolved and how will we adapt to meet modern data storage demands? In this episode Bill sits down with John Bonczek, Chief Revenue Officer of fifteenfortyseven Critical Systems Realty, a leading developer of highly interconnected, custom-designed data centers. They discuss the impact of AI on power and cooling requirements and…
…
continue reading

1
PP048: News Roundup – 5G Vulnerabilities Abound, CSRB Disbanded, Magic Packets Target Juniper Routers, and More
39:08
39:08
Play later
Play later
Lists
Like
Liked
39:08JJ and Drew catch you up on cybersecurity news including new research that uncovers a host of 5G/LTE vulnerabilities, the chain of breaches in a BeyondTrust attack that led to infiltration of the US Treasury Dept., and a lawsuit against LinkedIn alleging that data from paying customers was used to train AI models. Researchers unpack... Read more »…
…
continue reading

1
The Ultimate 2025 Tech & Cybersecurity Event Guide: Where to Be | On Location Coverage with Sean Martin and Marco Ciappelli
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39ITSPmagazine is gearing up for another year of in-depth event coverage, bringing insights from industry leaders, innovators, and companies making an impact in cybersecurity, technology, and society. Sean Martin and Marco Ciappelli outline their plans for 2025, emphasizing a mix of established conferences and new opportunities to highlight emerging …
…
continue reading

1
PP047: Why Packet Analysis (and Wireshark) Should Be In Your Security Toolkit
43:23
43:23
Play later
Play later
Lists
Like
Liked
43:23Don’t underestimate the value of packet analysis in your security strategy. And if you’re analyzing packets, the open-source Wireshark software is a go-to tool. On today’s episode, we talk with Chris Greer, a Wireshark trainer and consultant specializing in packet analysis. Chris explains the critical role of packet analysis in cybersecurity, parti…
…
continue reading

1
Part-3 IoT Meetup 050125: Nachshon Pincu SVP @NIAtech cyber security on -“Phygital” the future of IoT
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36נחשון פינקו מדבר על "פיגיטל", העתיד של מיזוג פיזי עם דיגיטל. אילו גורמים מובילים תעשיות וספקים בכיוון זה היכן ומתי היא תפגוש מומחי סייבר ותפעול רמה טכנית - 100 (קלה) Nachshon Pincu talks about The future of blending physical with digital. What factors lead industries and vendors in this direction? Where and when will it meet cyber and operational e…
…
continue reading

1
Part-2 IoT Meetup 050125: Nimrod Luria Co-Founder & CTO@IO01 on Testing Security for Embedded Device
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24The second recording from the first IoT meetup occurred on January 5th, 2025. This section reviews an IP camera's security, attack, and protection from the protocol level to the firmware. Technical Level - 300By Nachshon Pincu
…
continue reading