Secure Remote Access public
[search 0]
More
Download the App!
show episodes
 
Beyond Downtime: The Verito Advantage is the podcast for tax and accounting professionals who refuse to let IT issues interrupt their business. Hosted by the experts behind Verito.com, each episode explores the real risks behind "good enough" technology and how to build a firm that just works. Securely. Join us as we dive into real-world stories, compliance must-knows (like the FTC Safeguards Rule, IRS Pub 4557, WISP), and emerging tech shaping the future of financial practices. From ransomw ...
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Ledger is the gold standard of security in the crypto space. Our hardware wallets are essential for anyone wanting to take control of their digital value. At the heart of this ecosystem, Ledger connects you with everything in the digital assets space, providing access to services and freedom from compromise on security, ownership or user experience. On 'The Ledger Podcast', we have conversations with some of the most interesting thought leaders in crypto, cybersecurity and culture to discuss ...
  continue reading
 
Brought to you by Rightworks, the ACCOUNTING ANSWERS PODCAST is hosted by Rob Brown, co-founder of the Accounting Influencers Roundtable (AIR). On this weekly show with short, sharp episodes, Rob asks 110 experts and influencers the critical questions shaping the accounting profession. It keeps you informed of what's happening in the accounting world and the whole ecosystem of consultants, organizations, vendors and advisors who serve them. Go to https://www.rightworks.com for secure, remote ...
  continue reading
 
Artwork

1
The Aerospace Advantage

The Mitchell Institute for Aerospace Studies

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The Mitchell Institute for Aerospace Studies is proud to present The Aerospace Advantage, with Heather ”Lucky” Penney as the host. Every week, Lucky takes listeners into the world of aerospace power and help the audience understand what it takes to fly and fight in the sky, while also protecting America’s interests in space. Whether talking to top generals, standing on a flight line full of combat aircraft, looking at a rocket being prepared for launch, or hearing from those who have laid it ...
  continue reading
 
In a rapidly evolving industrial world, the demand for intelligent and secure communication tools has never been higher. This episode focuses on what’s ahead for the intrinsically safe phone—how innovation is driving the future of workplace safety, and what that means for businesses and workers alike. Visit us: https://infinity-ex.com/ With the rise of automation, AI, and IoT, the intrinsically safe mobile phone is no longer just a tool for calls and texts. It’s a smart device that integrate ...
  continue reading
 
Artwork

1
Ativion Pulse

Netop Podcast Team

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Ativion Pulse is a podcast exploring the dynamic world of education technology and the critical role of secure remote access in today's learning environments. Join us as we delve into the latest trends, challenges, and best practices in ed-tech, featuring insightful conversations with industry experts, educators, and technology leaders. We'll discuss topics such as: Securing student data: Protecting sensitive information in a remote and increasingly digital world. Improving remote learning e ...
  continue reading
 
Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
  continue reading
 
Artwork

1
The Daily Threat

QIT Solutions

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
On The Workflow Show, CHESA's Jason Whetstone and Ben Kilburg offer media workflow therapy and address overarching trends and specific tech topics to help guide you through these challenging yet exciting times of unprecedented change within the realm of digital workflows. CHESA is a full-service provider of technology systems and solutions that specializes in optimizing media workflows from creation to distribution and preservation. CHESA’s expert architects design pioneering asset managemen ...
  continue reading
 
We interview researchers and developers who are creating new and innovative ideas in AI and Machine Learning. This bi-weekly podcast is looking for practical insights from the research world that tell us where AI and Machine learning are headed.
  continue reading
 
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
  continue reading
 
Artwork

1
WebInnovationX

Dr. Rachel Yager

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
  continue reading
 
Loading …
show series
 
Joining us in our Netop Podcast is Michael Chatzilias, Group Director who is a founding member of Akeydor working on Netop for over 25 years. In this podcast we discuss the history of Netop as well as joint customers and the benefits from deploying the secure remote access technology.By Ativion Podcast Team
  continue reading
 
Episode Summary: Collaborative Combat Aircraft (CCA) stand forth as one of the most important airpower developments of the twenty-first century. We learn more about CCA by talking to two of the people involved with developing and building them: Mike Atwood from General Atomics and Andrew “Scar” Van Timmeren of Anduril. CCA’s ability to harness the …
  continue reading
 
As Dave Bittner is at the RSA Conference this week, our hosts ⁠⁠Maria Varmazis and ⁠⁠Joe Carrigan⁠⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from José on episode 335, sharing how UK banking features like Faster Payments and the “Check Payee” …
  continue reading
 
New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read mo…
  continue reading
 
In Episode 178, the Citrix Session team dives into the latest on-premises release—Citrix Virtual Apps and Desktops 2503. Join Bill Sutton, Geremy Meyers, and Todd Smith as they break down the top new features, including auto-scale insights, a redesigned Web Studio, enhanced storage load balancing, dynamic display rendering with Build-to-Lossless, a…
  continue reading
 
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠Selena Larson⁠, ⁠Proofpoint⁠ intelligence analyst and host of their podcast ⁠DISCARDED⁠. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
  continue reading
 
Episode Summary: In this Rendezvous episode, we discuss top Air Force and Space Force developments in Washington, D.C., and beyond. Topics include the latest defense budget plus-up via reconciliation and what this means for air and space power. We also discuss INDOPACOM Commander Admiral Paparo’s testimony regarding airpower gaps in the Pacific and…
  continue reading
 
This episode was recorded in French. To watch with English subtitles, visit Ledger's YouTube page here: https://www.youtube.com/watch?v=KfWC79WmJIs Join us in this insightful podcast episode as we delve into the dynamic world of Ledger, a global leader in digital asset security. Discover how Ledger's HR strategies are redefining workplace culture b…
  continue reading
 
As Maria is on vacation this week, our hosts ⁠Dave Bittner⁠ and ⁠Joe Carrigan⁠, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cybe…
  continue reading
 
In the digital battleground of cybersecurity, small and medium businesses are now the ultimate prey for ransomware attackers, with a staggering 126% surge in targeted attacks. This explosive episode of The Daily Threat exposes the alarming tactics cybercriminals are using to exploit SMBs’ vulnerabilities, turning them into prime targets for devasta…
  continue reading
 
Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
  continue reading
 
In our debut episode of Beyond Downtime: The Verito Advantage, we take you back to Thomson Reuters SYNERGY 2024, where industry leaders gathered to discuss the future of tax and accounting technology. Recorded live at last year’s event, this conversation is packed with more relevant insights than ever, from preparing your firm for the FTC Safeguard…
  continue reading
 
Joining our podcast is Chris Steffen, VP of Research Information Security at Enterprise Management Associates talks about the latest trends in Cybersecurity in terms of endpoint access and management. In addition, Chris offers a unique take on the security industry and the realities of what most companies need versus what is available.…
  continue reading
 
Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/owasp-security-misconfiguration⁠ Audio reference link: ⁠“What Is the Elvish Word for Friend?”⁠ Quora, 2021.…
  continue reading
 
In a stark wake-up call for businesses across the U.S., the recent Cleo ransomware breach exposes the critical vulnerabilities lurking in third-party vendor networks. This eye-opening episode of The Daily Threat dissects the sophisticated attack that sent shockwaves through the cybersecurity landscape, revealing how even seemingly secure organizati…
  continue reading
 
Episode Summary: France is America’s oldest ally. We’ve been through a lot: the American Revolution over 250 years ago, two World Wars, and ongoing worldwide military operations. Our two nations have stood side by side when it mattered most. This connection endures. These days, it’s more important than ever, considering China’s rise, Russia’s aggre…
  continue reading
 
In the rapidly evolving world of cybersecurity, small and medium businesses are facing a critical turning point. This episode of The Daily Threat dives deep into the landmark April 2025 regulations that are reshaping how SMBs handle data breaches and cybersecurity compliance. We unpack the new mandatory disclosure rules that could make or break bus…
  continue reading
 
Join Sergej Kunzm co-founder of 1inch, Carl Anderson, VP Engineering at Ledger, and Mo El-Sayed, Head of Brand Development at Ledger for a dynamic discussion on decentralized exchanges, Paris Blockchain Week, and the adoption of DeFi. Bringing DeFi to the mainstream has proved challenging at times. How has 1inch worked to overcome these challenges,…
  continue reading
 
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. This week Joe's got some follow up about his chickens. Joe's story is on LLM-powered coding tools, and how they are inc…
  continue reading
 
In a shocking revelation, The Daily Threat exposes the massive data breach at DeepSeek, a prominent AI company, where over a million sensitive records were left completely unprotected on a public database. This gripping episode uncovers how a simple configuration error exposed critical chat logs, API keys, and backend metadata, turning the AI compa…
  continue reading
 
Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
  continue reading
 
Please enjoy this encore episode of Word Notes. A broad OWASP Top 10 software development category representing missing, ineffective, or unforeseen security measures. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-insecure-design Audio reference link: “Oceans Eleven Problem Constraints Assumptions.” by Steve Jones, YouTube, 4 Nove…
  continue reading
 
Chaos erupts in the Microsoft Entra ecosystem as a simple logging mishap triggers widespread account lockouts across organizations. In this gripping episode of The Daily Threat, we dissect a critical incident where internal token logging practices inadvertently invalidated user credentials, exposing the fragile nature of identity management systems…
  continue reading
 
Ep: 35 Top experts answer: "Are business owners any closer to receiving proactive advice from accountants?" The Accounting Answers Podcast, hosted by Rob Brown, asks critical questions of the experts, leaders and influencers who shape the decision-making of accountants, CPAs and finance professionals. Today we ask: Are business owners any closer to…
  continue reading
 
In this episode of The Citrix Session, host Bill Sutton is joined by Todd Smith, recently promoted Senior Manager for Account Technology Strategists (ATS) in the public sector at Citrix. Together, they dive into a pivotal blog article released at Citrix UNITE in New Orleans—“Citrix and NVIDIA Partner to Deliver AI Virtual Workstations.” What’s Insi…
  continue reading
 
In this critical cybersecurity update, The Daily Threat dives deep into the latest AnyDesk vulnerability that’s sending shockwaves through remote access technology. Discover how a zero-day exploit could potentially compromise thousands of remote desktop sessions, giving attackers unprecedented control over business networks. Our experts break down …
  continue reading
 
Episode Summary: This week, The Aerospace Advantage takes a break for Easter, but that doesn't mean our listeners need to take a pause. In this week's episode we reach back to a previously recorded conversation where the Mitchell team reflects on the air war over Southeast Asia during the Vietnam War and speaks with combat pilot and POW Lt Col Gene…
  continue reading
 
Microsoft Defender is changing the game for cybersecurity, and IT professionals need to pay attention. In a bold move, Microsoft has removed the ability to disable real-time protection directly from the Windows Security app, forcing a more stringent security approach across organizations. This episode dives deep into the implications of this update…
  continue reading
 
NOTE: The following conversation takes place in French between Ledger CEO Pascal Gauthier, business mogul Maurice Lévy, and Ledger Exec VP, Enterprise Revenue Sebastien Badault Join Ledger CEO Pascal Gauthier and business mogul Maurice Lévy, along with Ledger's Sebastien Badault, in an insightful podcast as they delve into the secrets of their succ…
  continue reading
 
In a rapidly evolving industrial world, the demand for intelligent and secure communication tools has never been higher. This episode focuses on what’s ahead for the intrinsically safe phone—how innovation is driving the future of workplace safety, and what that means for businesses and workers alike. Visit us: https://infinity-ex.com/ With the ris…
  continue reading
 
Channing Anderson, Product Manager at Ativion recaps her recent talk at the 2025 COSN event in Seattle titled "You Can't Block Behavior, Collaborative Approach to Devices in Education." She highlights the key themes of the talk including a better approach to device management in an education setting for K-12.…
  continue reading
 
This week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines, while our other host, Maria Varmazis is at a conference. We begin with some follow-up, as Joe reflects on the density of gold. Then, Dave shares some heartfelt and moving words ab…
  continue reading
 
We’re diving into NMAP on today’s show with guest Chris Greer. Chris, an expert in network analysis and forensics, explains what NMAP is, the difference types of scans, how device fingerprinting works, and more. We also coin the term “swaptions” as we have some fun with NMAP terminology. He also gives details on how to... Read more »…
  continue reading
 
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
  continue reading
 
Ep: 34 Top experts answer: "Are business owners any closer to receiving proactive advice from accountants?" The Accounting Answers Podcast, hosted by Rob Brown, asks critical questions of the experts, leaders and influencers who shape the decision-making of accountants, CPAs and finance professionals. Today we ask: Are business owners any closer to…
  continue reading
 
Episode Summary: As the Air Force develops the operational construct for Collaborative Combat Aircraft, Doug Birkey and Brig Gen Houston "Slider" Cantwell, USAF (Ret.) urge the service to tap into two decades of lessons learned flying highly sophisticated uncrewed aircraft like the MQ-1 Predator, MQ-9 Reaper, RQ-4 Global Hawk, and RQ-170. Harnessin…
  continue reading
 
Join Ian Rogers on this episode of the Ledger Podcast as he dives deep into the groundbreaking integration of the Sui blockchain suite into Ledger Live. Discover how this seamless integration empowers users to send, receive, buy, swap, stake, and sign transactions with unparalleled security and ease. Ian is joined by Kostas Chalkias, co-founder and…
  continue reading
 
This week, while Dave Bittner is out, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with a lot of follow up on listener feedback this week! Justin shares a thought about how to tra…
  continue reading
 
Cisco Systems has a sprawling portfolio of home-grown and acquired products. What’s it like trying to find and address bugs and vulnerabilities across this portfolio? Omar Santos, a Distinguished Engineer at Cisco, gives us an inside look. We dig into how Cisco identifies security bugs using internal and external sources, the growing role of AI... …
  continue reading
 
Ep: 33 Top experts answer: "Are business owners any closer to receiving proactive advice from accountants?" The Accounting Answers Podcast, hosted by Rob Brown, asks critical questions of the experts, leaders and influencers who shape the decision-making of accountants, CPAs and finance professionals. Today we ask: Are business owners any closer to…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play