Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Ledger is the gold standard of security in the crypto space. Our hardware wallets are essential for anyone wanting to take control of their digital value. At the heart of this ecosystem, Ledger connects you with everything in the digital assets space, providing access to services and freedom from compromise on security, ownership or user experience. On 'The Ledger Podcast', we have conversations with some of the most interesting thought leaders in crypto, cybersecurity and culture to discuss ...
…
continue reading
Brought to you by Rightworks, the ACCOUNTING ANSWERS PODCAST is hosted by Rob Brown, co-founder of the Accounting Influencers Roundtable (AIR). On this weekly show with short, sharp episodes, Rob asks 110 experts and influencers the critical questions shaping the accounting profession. It keeps you informed of what's happening in the accounting world and the whole ecosystem of consultants, organizations, vendors and advisors who serve them. Go to https://www.rightworks.com for secure, remote ...
…
continue reading
The Mitchell Institute for Aerospace Studies is proud to present The Aerospace Advantage, with Heather ”Lucky” Penney as the host. Every week, Lucky takes listeners into the world of aerospace power and help the audience understand what it takes to fly and fight in the sky, while also protecting America’s interests in space. Whether talking to top generals, standing on a flight line full of combat aircraft, looking at a rocket being prepared for launch, or hearing from those who have laid it ...
…
continue reading
In a rapidly evolving industrial world, the demand for intelligent and secure communication tools has never been higher. This episode focuses on what’s ahead for the intrinsically safe phone—how innovation is driving the future of workplace safety, and what that means for businesses and workers alike. Visit us: https://infinity-ex.com/ With the rise of automation, AI, and IoT, the intrinsically safe mobile phone is no longer just a tool for calls and texts. It’s a smart device that integrate ...
…
continue reading
…
continue reading
Ativion Pulse is a podcast exploring the dynamic world of education technology and the critical role of secure remote access in today's learning environments. Join us as we delve into the latest trends, challenges, and best practices in ed-tech, featuring insightful conversations with industry experts, educators, and technology leaders. We'll discuss topics such as: Securing student data: Protecting sensitive information in a remote and increasingly digital world. Improving remote learning e ...
…
continue reading
Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
On The Workflow Show, CHESA's Jason Whetstone and Ben Kilburg offer media workflow therapy and address overarching trends and specific tech topics to help guide you through these challenging yet exciting times of unprecedented change within the realm of digital workflows. CHESA is a full-service provider of technology systems and solutions that specializes in optimizing media workflows from creation to distribution and preservation. CHESA’s expert architects design pioneering asset managemen ...
…
continue reading
We interview researchers and developers who are creating new and innovative ideas in AI and Machine Learning. This bi-weekly podcast is looking for practical insights from the research world that tell us where AI and Machine learning are headed.
…
continue reading
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
…
continue reading
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
…
continue reading
Watch Download File
…
continue reading

1
Akeydor, Netop Partnership and Benefits of Secure Remote Access
17:29
17:29
Play later
Play later
Lists
Like
Liked
17:29Joining us in our Netop Podcast is Michael Chatzilias, Group Director who is a founding member of Akeydor working on Netop for over 25 years. In this podcast we discuss the history of Netop as well as joint customers and the benefits from deploying the secure remote access technology.By Ativion Podcast Team
…
continue reading

1
Episode 235 — Understanding the CCA Edge: Innovators’ Insights
1:09:15
1:09:15
Play later
Play later
Lists
Like
Liked
1:09:15Episode Summary: Collaborative Combat Aircraft (CCA) stand forth as one of the most important airpower developments of the twenty-first century. We learn more about CCA by talking to two of the people involved with developing and building them: Mike Atwood from General Atomics and Andrew “Scar” Van Timmeren of Anduril. CCA’s ability to harness the …
…
continue reading
Watch Download File
…
continue reading

1
What’s inside the mystery box? Spoiler: It’s a scam!
46:13
46:13
Play later
Play later
Lists
Like
Liked
46:13As Dave Bittner is at the RSA Conference this week, our hosts Maria Varmazis and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from José on episode 335, sharing how UK banking features like Faster Payments and the “Check Payee” …
…
continue reading

1
PP061: Comparing Breach Reports, RSAC 2025 Highlights, and a Security Awareness Soapbox
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
…
continue reading

1
CVAD 2503: What’s New in Citrix Virtual Apps and Desktops
29:55
29:55
Play later
Play later
Lists
Like
Liked
29:55In Episode 178, the Citrix Session team dives into the latest on-premises release—Citrix Virtual Apps and Desktops 2503. Join Bill Sutton, Geremy Meyers, and Todd Smith as they break down the top new features, including auto-scale insights, a redesigned Web Studio, enhanced storage load balancing, dynamic display rendering with Build-to-Lossless, a…
…
continue reading

1
OWASP broken access control (noun) [Word Notes]
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.By N2K Networks
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [OMITB]
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
…
continue reading

1
Episode 234 — Defense Budget, Fighter Modernization, and Warfighting in Space: The Rendezvous
57:50
57:50
Play later
Play later
Lists
Like
Liked
57:50Episode Summary: In this Rendezvous episode, we discuss top Air Force and Space Force developments in Washington, D.C., and beyond. Topics include the latest defense budget plus-up via reconciliation and what this means for air and space power. We also discuss INDOPACOM Commander Admiral Paparo’s testimony regarding airpower gaps in the Pacific and…
…
continue reading

1
Beyond Remote Work: How Ledger is Building the Future of Collaboration and Innovation
57:51
57:51
Play later
Play later
Lists
Like
Liked
57:51This episode was recorded in French. To watch with English subtitles, visit Ledger's YouTube page here: https://www.youtube.com/watch?v=KfWC79WmJIs Join us in this insightful podcast episode as we delve into the dynamic world of Ledger, a global leader in digital asset security. Discover how Ledger's HR strategies are redefining workplace culture b…
…
continue reading
As Maria is on vacation this week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cybe…
…
continue reading

1
Ransomware on the Rise: Why SMBs Are Today’s Prime Target
5:56
5:56
Play later
Play later
Lists
Like
Liked
5:56In the digital battleground of cybersecurity, small and medium businesses are now the ultimate prey for ransomware attackers, with a staggering 126% surge in targeted attacks. This explosive episode of The Daily Threat exposes the alarming tactics cybercriminals are using to exploit SMBs’ vulnerabilities, turning them into prime targets for devasta…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
Thomson Reuters Synergy 2024 - Jatin Narang | Verito Technologies | Beyond Downtime
13:21
13:21
Play later
Play later
Lists
Like
Liked
13:21In our debut episode of Beyond Downtime: The Verito Advantage, we take you back to Thomson Reuters SYNERGY 2024, where industry leaders gathered to discuss the future of tax and accounting technology. Recorded live at last year’s event, this conversation is packed with more relevant insights than ever, from preparing your firm for the FTC Safeguard…
…
continue reading

1
Chris Steffen on the Biggest Challenges and Latest Trends in Cybersecurity Today
28:35
28:35
Play later
Play later
Lists
Like
Liked
28:35Joining our podcast is Chris Steffen, VP of Research Information Security at Enterprise Management Associates talks about the latest trends in Cybersecurity in terms of endpoint access and management. In addition, Chris offers a unique take on the security industry and the realities of what most companies need versus what is available.…
…
continue reading

1
OWASP security misconfiguration (noun) [Word Notes]
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.…
…
continue reading

1
Ransomware Reality Check: Cleo Breach Puts Third-Party Risks in the Spotlight
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50In a stark wake-up call for businesses across the U.S., the recent Cleo ransomware breach exposes the critical vulnerabilities lurking in third-party vendor networks. This eye-opening episode of The Daily Threat dissects the sophisticated attack that sent shockwaves through the cybersecurity landscape, revealing how even seemingly secure organizati…
…
continue reading

1
Episode 233 — Securing Air and Space: Allied Insights
1:00:12
1:00:12
Play later
Play later
Lists
Like
Liked
1:00:12Episode Summary: France is America’s oldest ally. We’ve been through a lot: the American Revolution over 250 years ago, two World Wars, and ongoing worldwide military operations. Our two nations have stood side by side when it mattered most. This connection endures. These days, it’s more important than ever, considering China’s rise, Russia’s aggre…
…
continue reading

1
The Compliance Crunch: New Rules, Big Risks for SMBs
4:51
4:51
Play later
Play later
Lists
Like
Liked
4:51In the rapidly evolving world of cybersecurity, small and medium businesses are facing a critical turning point. This episode of The Daily Threat dives deep into the landmark April 2025 regulations that are reshaping how SMBs handle data breaches and cybersecurity compliance. We unpack the new mandatory disclosure rules that could make or break bus…
…
continue reading
Watch Download File
…
continue reading

1
Decentralized Then vs. Now: What's Changed Since the Last Cycle?
41:14
41:14
Play later
Play later
Lists
Like
Liked
41:14Join Sergej Kunzm co-founder of 1inch, Carl Anderson, VP Engineering at Ledger, and Mo El-Sayed, Head of Brand Development at Ledger for a dynamic discussion on decentralized exchanges, Paris Blockchain Week, and the adoption of DeFi. Bringing DeFi to the mainstream has proved challenging at times. How has 1inch worked to overcome these challenges,…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
…
continue reading

1
Ransomware Reloaded: U.S. Faces a Cybercrime Surge
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35FBI warns of rising ransomware attacks as small businesses and critical infrastructure remain prime targets.By QIT Solutions
…
continue reading
Watch Download File
…
continue reading

1
Massive DeepSeek Data Breach Exposes AI Secrets—Are You Next?
3:17
3:17
Play later
Play later
Lists
Like
Liked
3:17In a shocking revelation, The Daily Threat exposes the massive data breach at DeepSeek, a prominent AI company, where over a million sensitive records were left completely unprotected on a public database. This gripping episode uncovers how a simple configuration error exposed critical chat logs, API keys, and backend metadata, turning the AI compa…
…
continue reading

1
PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
…
continue reading
Watch Download File
…
continue reading
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
…
continue reading

1
🚨Microsoft Entra Lockouts: A Token Logging Mishap Causes Chaos
3:38
3:38
Play later
Play later
Lists
Like
Liked
3:38Chaos erupts in the Microsoft Entra ecosystem as a simple logging mishap triggers widespread account lockouts across organizations. In this gripping episode of The Daily Threat, we dissect a critical incident where internal token logging practices inadvertently invalidated user credentials, exposing the fragile nature of identity management systems…
…
continue reading

1
Accountants Unveiled: More Than Just Financial Experts
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49Ep: 35 Top experts answer: "Are business owners any closer to receiving proactive advice from accountants?" The Accounting Answers Podcast, hosted by Rob Brown, asks critical questions of the experts, leaders and influencers who shape the decision-making of accountants, CPAs and finance professionals. Today we ask: Are business owners any closer to…
…
continue reading

1
Citrix + NVIDIA: AI Virtual Workstations Are Here
28:19
28:19
Play later
Play later
Lists
Like
Liked
28:19In this episode of The Citrix Session, host Bill Sutton is joined by Todd Smith, recently promoted Senior Manager for Account Technology Strategists (ATS) in the public sector at Citrix. Together, they dive into a pivotal blog article released at Citrix UNITE in New Orleans—“Citrix and NVIDIA Partner to Deliver AI Virtual Workstations.” What’s Insi…
…
continue reading

1
Remote Access Gets a Reality Check and AnyDesk Patch Drops After Active Exploits
6:13
6:13
Play later
Play later
Lists
Like
Liked
6:13In this critical cybersecurity update, The Daily Threat dives deep into the latest AnyDesk vulnerability that’s sending shockwaves through remote access technology. Discover how a zero-day exploit could potentially compromise thousands of remote desktop sessions, giving attackers unprecedented control over business networks. Our experts break down …
…
continue reading

1
Episode 232 — Air Combat Survivability Through a POWs Experience
1:00:34
1:00:34
Play later
Play later
Lists
Like
Liked
1:00:34Episode Summary: This week, The Aerospace Advantage takes a break for Easter, but that doesn't mean our listeners need to take a pause. In this week's episode we reach back to a previously recorded conversation where the Mitchell team reflects on the air war over Southeast Asia during the Vietnam War and speaks with combat pilot and POW Lt Col Gene…
…
continue reading

1
Microsoft Defender Cracks Down—You Can’t Turn It Off
3:03
3:03
Play later
Play later
Lists
Like
Liked
3:03Microsoft Defender is changing the game for cybersecurity, and IT professionals need to pay attention. In a bold move, Microsoft has removed the ability to disable real-time protection directly from the Windows Security app, forcing a more stringent security approach across organizations. This episode dives deep into the implications of this update…
…
continue reading

1
Building in Europe: Challenges and Opportunities
22:09
22:09
Play later
Play later
Lists
Like
Liked
22:09NOTE: The following conversation takes place in French between Ledger CEO Pascal Gauthier, business mogul Maurice Lévy, and Ledger Exec VP, Enterprise Revenue Sebastien Badault Join Ledger CEO Pascal Gauthier and business mogul Maurice Lévy, along with Ledger's Sebastien Badault, in an insightful podcast as they delve into the secrets of their succ…
…
continue reading

1
Safety Meets Innovation: The Future of Intrinsically Safe Phones
1:57
1:57
Play later
Play later
Lists
Like
Liked
1:57In a rapidly evolving industrial world, the demand for intelligent and secure communication tools has never been higher. This episode focuses on what’s ahead for the intrinsically safe phone—how innovation is driving the future of workplace safety, and what that means for businesses and workers alike. Visit us: https://infinity-ex.com/ With the ris…
…
continue reading

1
You Can't Block Behavior, Collaborative Approach to Devices in Education
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52Channing Anderson, Product Manager at Ativion recaps her recent talk at the 2025 COSN event in Seattle titled "You Can't Block Behavior, Collaborative Approach to Devices in Education." She highlights the key themes of the talk including a better approach to device management in an education setting for K-12.…
…
continue reading
This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria Varmazis is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words ab…
…
continue reading
Watch Download File
…
continue reading

1
PP058: Network Discovery with NMAP: You’ve Got Swaptions
45:09
45:09
Play later
Play later
Lists
Like
Liked
45:09We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term “swaptions” as we have some fun with NMAP terminology. He also gives details on how to... Read more »…
…
continue reading
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
…
continue reading

1
Navigating Complexity: The Accountant’s New Role
11:36
11:36
Play later
Play later
Lists
Like
Liked
11:36Ep: 34 Top experts answer: "Are business owners any closer to receiving proactive advice from accountants?" The Accounting Answers Podcast, hosted by Rob Brown, asks critical questions of the experts, leaders and influencers who shape the decision-making of accountants, CPAs and finance professionals. Today we ask: Are business owners any closer to…
…
continue reading

1
Episode 231 — The Future of Uncrewed Airpower: Pilot Perspective
46:32
46:32
Play later
Play later
Lists
Like
Liked
46:32Episode Summary: As the Air Force develops the operational construct for Collaborative Combat Aircraft, Doug Birkey and Brig Gen Houston "Slider" Cantwell, USAF (Ret.) urge the service to tap into two decades of lessons learned flying highly sophisticated uncrewed aircraft like the MQ-1 Predator, MQ-9 Reaper, RQ-4 Global Hawk, and RQ-170. Harnessin…
…
continue reading
Join Ian Rogers on this episode of the Ledger Podcast as he dives deep into the groundbreaking integration of the Sui blockchain suite into Ledger Live. Discover how this seamless integration empowers users to send, receive, buy, swap, stake, and sign transactions with unparalleled security and ease. Ian is joined by Kostas Chalkias, co-founder and…
…
continue reading

1
You get a million dollars, and you get a million dollars!
37:12
37:12
Play later
Play later
Lists
Like
Liked
37:12This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a lot of follow up on listener feedback this week! Justin shares a thought about how to tra…
…
continue reading
Watch Download File
…
continue reading

1
PP057: Behind the Scenes At Cisco: PSIRT, AI, CVEs, and VEX
54:13
54:13
Play later
Play later
Lists
Like
Liked
54:13Cisco Systems has a sprawling portfolio of home-grown and acquired products. What’s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished Engineer at Cisco, gives us an inside look. We dig into how Cisco identifies security bugs using internal and external sources, the growing role of AI... …
…
continue reading

1
OWASP cryptographic failures (noun) [Word Notes]
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Please enjoy this encore of Word Notes. Code that fails to protect sensitive information. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-cryptographic-failure Audio reference link: Vandana Verma. “OWASP Spotlight - Project 10 - Top10.” YouTube Video. YouTube, January 4, 2021.By N2K Networks
…
continue reading

1
Embracing Change: Accountants as Pioneers of Progress
8:54
8:54
Play later
Play later
Lists
Like
Liked
8:54Ep: 33 Top experts answer: "Are business owners any closer to receiving proactive advice from accountants?" The Accounting Answers Podcast, hosted by Rob Brown, asks critical questions of the experts, leaders and influencers who shape the decision-making of accountants, CPAs and finance professionals. Today we ask: Are business owners any closer to…
…
continue reading