Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Every single podcast we publish in one convenient feed. This is a LOT of content. Hours of audio each week.
…
continue reading
Our most popular pods in one fat feed! Too much technology would never be enough. Includes Heavy Networking, Network Break, Day Two DevOps, Packet Protector, and Network Automation Nerds. Plus new shows when they launch so you know about fresh awesomeness.
…
continue reading
At Tanium, we live, dream, and debate cybersecurity 24/7. Now, with TANIUM PODCAST, you’re in on the conversation. Go behind the scenes with our team leaders, partners, and customers in the U.S., UK, Europe, Asia, and elsewhere around the globe. We’ll discuss the latest products, perspectives, and success stories at Tanium, an innovator in security software and the first to make autonomous endpoint management (AEM) a reality.
…
continue reading
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading

1
3266: Turning Data into Decisions: Alembic’s Role in Smarter Marketing
25:14
25:14
Play later
Play later
Lists
Like
Liked
25:14How do you measure the real impact of marketing when every campaign unfolds across multiple channels, mixes digital with physical, and generates more data than most teams can handle? That’s exactly what Abby Kearns and the team at Alembic are tackling. As Chief Technology Officer, Abby is helping build a marketing intelligence platform that doesn't…
…
continue reading

1
3267: Moving Beyond Attention: Branding in the Age of AI and XR
47:13
47:13
Play later
Play later
Lists
Like
Liked
47:13What happens when marketing, psychology, and emerging tech converge around a single purpose, redefining the relationship between brands and consumers? In today’s episode, I’m joined by Jaime Schwarz, a creative force behind Brand Therapy, The TeamFlow Institute, and MRKD.art, whose work is challenging the very foundations of modern brand strategy. …
…
continue reading

1
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-473
…
continue reading

1
HN779: Do We Really Need the Modern Networking Stack?
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15On today’s Heavy Networking, a roundtable panel considers whether a modern network needs to be built around underlays and overlays. This isn’t just Ethan yelling at clouds. This is a legitimate question pondering the real-world value of an overlay/underlay approach. Is overlay everywhere overkill, or is that the architecture we need to deliver a sa…
…
continue reading

1
HN779: Do We Really Need the Modern Networking Stack?
55:15
55:15
Play later
Play later
Lists
Like
Liked
55:15On today’s Heavy Networking, a roundtable panel considers whether a modern network needs to be built around underlays and overlays. This isn’t just Ethan yelling at clouds. This is a legitimate question pondering the real-world value of an overlay/underlay approach. Is overlay everywhere overkill, or is that the architecture we need to deliver a sa…
…
continue reading

1
TNO027: Seeing the Internet With Doug Madory
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Doug Madory has been called “The Man Who Can See the Internet.” Doug has developed a reputation for identifying significant developments in the global layout of the internet. He joins us today to discuss his role in analyzing internet data to identify trends and insights. He shares his journey from a data QA position to... Read more »…
…
continue reading

1
TNO027: Seeing the Internet With Doug Madory
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Doug Madory has been called “The Man Who Can See the Internet.” Doug has developed a reputation for identifying significant developments in the global layout of the internet. He joins us today to discuss his role in analyzing internet data to identify trends and insights. He shares his journey from a data QA position to... Read more »…
…
continue reading

1
3265: The Future of Safe Tech for Kids Starts with Troomi
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03What if the solution to screen addiction, online bullying, and tech-driven anxiety lies not in removing devices altogether, but in rethinking how we introduce them? That’s the question at the heart of my conversation with Bill Brady, co-founder and CEO of Troomi. In a world where children are spending up to nine hours a day on screens, and where th…
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
IPB174: How Enterprise IPv6 Requirements Are Shaping Microsoft Windows
38:44
38:44
Play later
Play later
Lists
Like
Liked
38:44Today we talk with Tommy Jensen, a Senior Technical PM Strategist at Microsoft, about IPv6 support in Windows. Tommy shares what he hears from enterprises that are moving toward IPv6-mostly, strategies for dealing with older applications and devices that expect IPv4, and how the customer conversations he’s having about IPv6 now are more engaged and…
…
continue reading

1
N4N024: DNS Security, Record Types, and Reverse DNS
49:19
49:19
Play later
Play later
Lists
Like
Liked
49:19This week we continue with DNS. In our last episode we covered the basics; today we expand our scope to cover topics such as security for DNS, reverse DNS, and DNS record types. For dessert this week, a serving of Raspberry Pi and Happy Eyeballs. Episode Links: DNS: Turning Names into Numbers – N Is... Read more »…
…
continue reading

1
N4N024: DNS Security, Record Types, and Reverse DNS
49:19
49:19
Play later
Play later
Lists
Like
Liked
49:19This week we continue with DNS. In our last episode we covered the basics; today we expand our scope to cover topics such as security for DNS, reverse DNS, and DNS record types. For dessert this week, a serving of Raspberry Pi and Happy Eyeballs. Episode Links: DNS: Turning Names into Numbers – N Is... Read more »…
…
continue reading
As Maria is on vacation this week, our hosts Dave Bittner and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Joe and Dave are joined by guest Rob Allen from ThreatLocker who shares a story on how a spoofed call to the help desk unraveled into a full-blown cybe…
…
continue reading

1
3264: How Deepdub Is Scaling Storytelling Without Losing the Human Touch
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37What if AI could help your content speak every language without losing its heart? In today’s episode, I sat down with Oz Krakowski, Chief Business Development Officer at Deepdub, a company reshaping how stories cross linguistic and cultural borders through AI-powered dubbing. As global demand for diverse entertainment continues to surge, Deepdub is…
…
continue reading

1
D2DO271: Public Vs. Private Cloud In 2025
38:33
38:33
Play later
Play later
Lists
Like
Liked
38:33The shine has been coming off public cloud for awhile. Cloud costs remain high, complexity is growing, and public cloud interoperability is difficult. And while there’s talk about moving back to private cloud, that migration presents its own costs and complexities. To help us navigate the challenge that is cloud in 2025, we welcome Mark... Read mor…
…
continue reading

1
D2DO271: Public Vs. Private Cloud In 2025
38:33
38:33
Play later
Play later
Lists
Like
Liked
38:33The shine has been coming off public cloud for awhile. Cloud costs remain high, complexity is growing, and public cloud interoperability is difficult. And while there’s talk about moving back to private cloud, that migration presents its own costs and complexities. To help us navigate the challenge that is cloud in 2025, we welcome Mark... Read mor…
…
continue reading

1
3263: How Neo4j and Graph Databases Help Enterprises Make Smarter Decisions
30:48
30:48
Play later
Play later
Lists
Like
Liked
30:48How do you uncover misinformation and financial fraud hidden in plain sight across thousands of digital platforms during a global election cycle? In this episode, I spoke with Jim Webber, Chief Scientist at Neo4j, to explore how graph database technology is being used to expose coordinated disinformation campaigns, empower AI systems, and help ente…
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
3262: What Sovereign Cloud for Europe Means for Business Leaders
48:25
48:25
Play later
Play later
Lists
Like
Liked
48:25What does digital sovereignty mean in the age of cloud computing, and is Europe finally prepared to rethink its reliance on foreign infrastructure? In this episode, I speak with David Michels from Queen Mary University of London about his latest research, which examines the growing demand for sovereign cloud services across Europe. Commissioned by …
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading
AI can impact an enterprise in several ways: making individuals more productive, making products and services more effective, and making it easier for customers and partners to do business. IT plays a critical role in enabling AI to have these impacts. On today’s sponsored Heavy Strategy, Cisco CIO Fletcher Previn explains how to locate AI use... R…
…
continue reading

1
HW051: How Wi-Fi Devices Handle Roaming On 2.4, 5, and 6 GHz Bands
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32Today on Heavy Wireless we welcome Jerry Olla to give us details from his talk “Roaming Wars: How Wi-Fi Devices Handle 2.4, 5, and 6 GHz”. Jerry tested the roaming behavior of popular Wi-Fi clients across 2.4, 5, and 6 GHz. He explains his testing protocol and results, and answers questions such as whether tri-band... Read more »…
…
continue reading

1
3261: How Cask Canada is Redefining Tech Services in Canada
46:41
46:41
Play later
Play later
Lists
Like
Liked
46:41In today’s episode of Tech Talks Daily, I sit down with Jeff Butler, General Manager of Cask Canada, who shares the story of how he led a tech startup to a standout position in the competitive ServiceNow ecosystem in less than a year. Listen in to learn how Cask Canada grew from startup to standout in the ServiceNow ecosystem by focusing on people,…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
OWASP security misconfiguration (noun) [Word Notes]
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Please enjoy this encore of Word Notes. The state of a web application when it's vulnerable to attack due to an insecure configuration. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-security-misconfiguration Audio reference link: “What Is the Elvish Word for Friend?” Quora, 2021.…
…
continue reading

1
13: As Healthcare Cyberattacks Rise, AnMed Reduces Its Tech Debt with Tanium
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26“When I got there, they had over 200,000 critical, high and medium vulnerabilities. Since bringing in Tanium, we've just had another security assessment done and we only had 30,000.” Reducing serious vulnerabilities by 170,000 is just one of the ways CISO Scott Dickinson has utilized Tanium to reduce the attack surface since arriving at AnMed, a no…
…
continue reading

1
3260: How Icertis is Transforming Contracts into AI-Powered Business Assets
31:16
31:16
Play later
Play later
Lists
Like
Liked
31:16What if contracts could do more than sit in a drawer gathering dust? In today's episode, I sit down with Monish Darda, CTO and Co-founder of Icertis, to explore how AI is transforming contracts into powerful, active business assets. Monish shares how Icertis has evolved from early machine learning models to leveraging large language models like GPT…
…
continue reading

1
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10Take a Network Break! We start with a Red Alert for SAP NetWeaver’s Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »…
…
continue reading

1
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10Take a Network Break! We start with a Red Alert for SAP NetWeaver’s Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »…
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
3259: The Evolution of Stack Overflow in a World Shaped by AI
26:31
26:31
Play later
Play later
Lists
Like
Liked
26:31In today’s episode of Tech Talks Daily, I sit down with Prashanth Chandrasekar, CEO of Stack Overflow, to explore how the rise of AI is reshaping the future of software development and the evolving role of community-driven platforms. Prashanth offers a grounded view of what is happening behind the headlines as the tech world moves into the third ye…
…
continue reading

1
3258: The Pragmatic Approach to Legacy Systems with Quesma
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44How do businesses untangle years of legacy technology without risking everything they have built? Today on Tech Talks Daily, I sat down with Jacek Migdał, founder and CEO of Quesma, to explore this question and discover how his company offers a fresh and pragmatic approach to database migration and optimization. Jacek shared the story behind Quesma…
…
continue reading

1
3257: Gregory Shepard Reveals the Seven Stages of Startup Success
28:40
28:40
Play later
Play later
Lists
Like
Liked
28:40When building a successful startup, the difference between thriving and failing often lies in understanding the journey itself. Today, I had the pleasure of speaking with Gregory Shepard, the entrepreneur behind "The Startup Lifecycle" and the founder of the Startup Science platform. Gregory's research-driven insights offer a clear and practical ro…
…
continue reading

1
3256: How SportAI is Redefining Coaching with Computer Vision and AI
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35How can computer vision and AI reshape the future of coaching, player development, and fan engagement in sports? In today's episode of Tech Talks Daily, I sit down with Lauren Pedersen, CEO and co-founder of SportAI, to explore how AI brings advanced sports analysis to athletes and coaches everywhere, not just to elite professionals. Lauren shares …
…
continue reading

1
Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
…
continue reading