The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
…
continue reading
Under the Juniper Tree with Andrew Crowe-- In this fast-paced, modern world, depression and anxiety entangle the minds of millions. Just as God provided comfort to Elijah under the juniper tree, each episode endeavors to bring biblical light to the shadows of life.
…
continue reading
Every podcast produced by The Light Network, in one convenient location! http://thelightnetwork.tv/
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
Unlock the secrets of channel marketing with Channel Chats with Tina. Host Tina O'Dell, Juniper Networks’ channel marketing powerhouse, and co-host Harry Radcliffe deliver actionable advice on AI, leadership, and more. With a perfect blend of expertise and humor, this podcast is a must-listen for marketers and business professionals at any stage of their career.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
AI and digital expert Suchi Srinivasan and fintech practice leader Kamila Rakhimova from Boston Consulting Group (BCG) talk to the women at the vanguard of business, digital, and technology. They’re digging into how these powerhouse leaders got where they are—everything from the joy of projects gone right to the realities of family responsibilities. And crucially, asking: what was that moment you knew you weren't merely getting there...you had arrived? That's when you know you're in your ele ...
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
All of your flavor news and views right in one podcast from comedian Jesse Elias and friend-of-comedian Adam. Season 2 begins in Spring 2019!
…
continue reading
Once a week we get together in a studio somewhere in London to take the piss out of telecoms and technology for an hour or so.
…
continue reading
Wireless LAN Professionals is a place to Educate, Inform, Encourage and Entertain those involved in Wireless LANs. This Wireless LAN Professionals Podcast is an audio manifestation of those goals. Our host is Wireless LAN veteran, consultant, designer, and teacher… Keith Parsons.
…
continue reading
Podcast on entrepreneurship and investment by Riana Shah, concurrent degree student at MIT and Harvard. Support this podcast: https://podcasters.spotify.com/pod/show/venture-vignettes/support
…
continue reading
Each week, TechTarget’s news team provides candid insight and analysis of the biggest IT news headlines of the week.
…
continue reading
The Routing Table podcast is hosted by Melchior Aelmans and Rick Mur. We talk about technology and anything related.
…
continue reading

1
“What Does Nose Picking Have To Do With Just Reading Headlines?” (Under the Juniper Tree S21E8)
21:47
21:47
Play later
Play later
Lists
Like
Liked
21:47Host: Andrew Crowe | Released Thursday, May 1, 2025 As the title asks, “What does the subject of nose picking have to do with just reading the headlines?” That’s the question Andrew will answer as he hopes to encourage us to stay away from cognitive bias and to read more than just the headlines of […]…
…
continue reading

1
TNO026: Gain Confidence in AI for NetOps with Juniper Networks (Sponsored)
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58Confidence in a new technology is one of the greatest barriers to adoption of that technology. If you don’t believe it will improve your NetOps, why would you adopt it? This is especially true of AI products. On today’s show, we’re joined by Bob Friday, Chief AI Officer of Mist/Juniper to make the case for... Read more »…
…
continue reading

1
JAGS keynote: The intricacies of wartime cyber threat intelligence
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07Three Buddy Problem - Episode 45: (The buddies are trapped in timezone hell with cross-continent travel this week). In the meantime, absorb this keynote presented by Juan Andres Guerrero-Saade (JAG-S) at CounterThreats 2023. It's a frank discussion on the role of cyber threat intelligence (CTI) during wartime and its importance in bridging informat…
…
continue reading

1
TNO028: Move From Monitoring to Full Internet Stack Observability: New Strategies for NetOps (Sponsored)
52:35
52:35
Play later
Play later
Lists
Like
Liked
52:35Network monitoring, Internet monitoring, and observability are all key components of NetOps. We speak with sponsor Catchpoint to understand how Catchpoint can help network operators proactively identify and resolve issues before they impact customers. We discuss past and current network monitoring strategies and the challenges that operators face w…
…
continue reading

1
“When Church Members Hurt Each Other” (Four Preachers and a Podcast S5E3)
55:46
55:46
Play later
Play later
Lists
Like
Liked
55:46Hosts: Robert Hatfield,Chance Hicks, Hiram Kemp, and Brad McNutt | Released Friday, May 9, 2025 In this heartfelt episode, the four preachers delve into the sensitive topic of interpersonal hurt within the church community. Building upon the previous discussions in their “Church Hurt” miniseries, they explore how conflicts among church members can …
…
continue reading

1
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
…
continue reading

1
“Leading Biblically by Trusting Faithfully” with Dr. Matt Guy (Preachers in Training S21E10)
36:48
36:48
Play later
Play later
Lists
Like
Liked
36:48Host: Robert Hatfield | Released Thursday, May 8, 2025 What does it mean to lead like Abraham—with unwavering trust in God, even when the path seems uncertain? In this episode, Matt Guy joins Robert Hatfield to explore biblical leadership through the lens of trust, using Genesis 22 as a foundation. Matt, a radiologist in Charlotte, […]…
…
continue reading

1
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
…
continue reading
Send us a text Consulting Engineers (CEs) at networking vendors blend deep technical expertise with customer-facing skills to bridge the gap between account managers and specialized solution design. They operate as specialists who support Sales Engineers when customer requirements demand deeper technical knowledge. • CEs often join from traditional…
…
continue reading

1
“The Minor Prophets as One Book?” (Inside the Scholar’s Study S5E8)
42:35
42:35
Play later
Play later
Lists
Like
Liked
42:35Hosts: Ed Gallagher and Brad McNutt | Released Wednesday, May 7, 2025 Watch the Video In this Inside the Scholar’s Study episode, Dr. Gallagher discusses whether the Twelve should be read as one book or as individual books! We want to hear from you! Subscription LinksBy The Light Network
…
continue reading

1
SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
…
continue reading

1
“The Frankfurt Inscription” (Light From the Past S17E7)
15:01
15:01
Play later
Play later
Lists
Like
Liked
15:01Host: Dewayne Bryant | Released Tuesday, May 6, 2025 The Frankfurt Inscription has been called an artifact that will rewrite Christian history. This discovery isn’t quite that important, but it does tell us something about early Christianity. We want to hear from you! Subscription LinksBy The Light Network
…
continue reading

1
SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost;
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
…
continue reading

1
NB525: Cisco, IBM Recruit AI for Threat Response; HPE Air-Gaps Private Clouds
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Take a Network Break! This week we catch up on the Airborne vulnerabilities affecting Apple’s AirPlay protocol and SDK, and get an update on active exploits against an SAP NetWeaver vulnerability–a patch is available, so get fixing if you haven’t already. Palo Alto Networks launches the AIRS platform to address AI threats in the enterprise,... Read…
…
continue reading

1
“BONUS: Interviews with the Faith & Flourish Collective” (The Ruffled Mango Scripture Writing Podcast S1E10)
1:06:57
1:06:57
Play later
Play later
Lists
Like
Liked
1:06:57Hosts: Kristen Hicks, Alyssa Clark, Christy Cook, Ashley Deffenbaugh, and Kelly Epperson | Released Monday, May 5, 2025 Listen in as Kristen interviews 5 sweet friends who also have faith-based businesses/ministries: Melissa Flanagan with Lissa Sue Designs, Emily Hatfield with Wifey Wednesdays, Emily Hayes with The Pearly Peacock, Laura Jenkins wit…
…
continue reading

1
SANS Stormcast Monday, May 5th: Steganography Challenge; Microsoft Makes Passkeys Default and Moves Away from Authenticator as Password Manager; Magento Components Backdoored.
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Microsoft Makes Passkeys Default Authentication Method Microsoft is now encouraging new users to use Passkeys as the default and only login method, further moving away from password…
…
continue reading

1
Signalgate redux, OpenAI's Aardvark, normalizing cyber offense
2:38:40
2:38:40
Play later
Play later
Lists
Like
Liked
2:38:40Three Buddy Problem - Episode 44: We unpack news that US government officials are using an obscure app to archive Signal messages, OpenAI’s new “Aardvark” code-evaluation and reasoning model and leapfrog implications, NSC cyber lead Alexei Bulazel on normalizing US offensive operations, and JP Morgan Chase CISO’s warning to software vendors. Plus, …
…
continue reading

1
TNO027: Seeing the Internet With Doug Madory
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02Doug Madory has been called “The Man Who Can See the Internet.” Doug has developed a reputation for identifying significant developments in the global layout of the internet. He joins us today to discuss his role in analyzing internet data to identify trends and insights. He shares his journey from a data QA position to... Read more »…
…
continue reading

1
“Importance Of Training The Youth w/ Robert Hatfield” (Soul Training S5E9)
35:49
35:49
Play later
Play later
Lists
Like
Liked
35:49THE Robert Hatfield joins the guys on today’s episode to discuss the importance of training young people in Christianity. Along with a few laughs, the Soul Training team and Robert discuss specific ways and programs that congregations and parents can use to teach the younger members about Jesus. This episode is recorded LIVE at Lads to Leaders 2025…
…
continue reading

1
SANS Stormcast Friday, May 2nd: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
…
continue reading
The guys celebrate the nicest day of the year by spending it locked in a small room with special guest Phil Mottram from HPE. They start by finding out all about Aruba, which is the bit of the company Phil runs, and soon branch off onto a bunch of other HPE-related topics. Among those is the IT security environment, which eventually leads them to t…
…
continue reading

1
Is Your Evangelism on Life Support? – with Matt Miller (Preachers in Training S21E9)
32:46
32:46
Play later
Play later
Lists
Like
Liked
32:46Host: Robert Hatfield | Released Thursday, May 1, 2025 In this episode of Preachers in Training, Robert Hatfield welcomes Matt Miller, minister for the 109 church of Christ in Lebanon, TN, to discuss the urgent state of personal evangelism. Are our efforts to reach the lost alive and thriving, or are they barely hanging on? […]…
…
continue reading

1
“What Does Nose Picking Have To Do With Just Reading Headlines?” (Under the Juniper Tree S21E8)
21:47
21:47
Play later
Play later
Lists
Like
Liked
21:47Host: Andrew Crowe | Released Thursday, May 1, 2025 As the title asks, “What does the subject of nose picking have to do with just reading the headlines?” That’s the question Andrew will answer as he hopes to encourage us to stay away from cognitive bias and to read more than just the headlines of […]…
…
continue reading

1
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
…
continue reading

1
“Diet Coke Hey Dudes” (Authentically Adam S11E9)
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46Host: Wayne Jones | Released Wednesday, April 30, 2025 This week Wayne explains the value of loving and befriending those that you lead. Leadership is far more about relationship than it is about authority. As elders, preachers, fathers, and teachers, we need to seek genuine friendship with those we lead. Jesus modeled this for us. […]…
…
continue reading

1
“A Prophet Arises” (Wifey Wednesdays S21E11)
9:29
9:29
Play later
Play later
Lists
Like
Liked
9:29Host: Emily Hatfield | Released Wednesday, April 30, 2025 On this episode of Wifey Wednesdays, Emily discusses 1 Kings 17-19, as the great prophet Elijah comes onto the scene. From there, listeners are encouraged to examine their own lives and realize how deeply God cares for us and is with us in good times and […]…
…
continue reading

1
“The Twelve & The Dead Sea Scrolls (4)” (Inside the Scholar’s Study S5E7)
27:17
27:17
Play later
Play later
Lists
Like
Liked
27:17Hosts: Ed Gallagher and Brad McNutt | Released Wednesday, April 30, 2025 Watch the Video In this Inside the Scholar’s Study episode, Dr. Gallagher discusses some possible Dead Sea Scrolls forgeries of the Minor Prophets! We want to hear from you! Subscription LinksBy The Light Network
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
…
continue reading

1
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10Take a Network Break! We start with a Red Alert for SAP NetWeaver’s Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »…
…
continue reading

1
“Spiritual Maturity Part 2” (The Ruffled Mango Scripture Writing Podcast S1E9)
26:43
26:43
Play later
Play later
Lists
Like
Liked
26:43Hosts: Kristen Hicks, Alyssa Clark, Christy Cook, Ashley Deffenbaugh, and Kelly Epperson | Released Monday, April 28, 2025 Ashley, Kelly, and Kristen talk about (intentionally) training ourselves for godliness, forming good study habits, and understanding how trials can help us grow spiritually. Episode Resources: Spiritual Maturity scripture writi…
…
continue reading

1
Steering Innovation Through Change with Coupa’s Leagh Turner
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08We want to hear from you! Email us at [email protected] with a voice memo describing your In Your Ellement moment. We might feature your story in an upcoming episode! *** How do today’s business leaders balance performance with empathy in a changing world? Leagh Turner is the CEO of Coupa, a business spend management platform that manages tr…
…
continue reading

1
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
…
continue reading
This second pod of the week was recorded after the lads had been out for a few the previous evening. In the absence of a guest, Iain and Scott indulge themselves by reflecting on a conversation they had about AI after a few beers. They eventually move on to the big story of the week – Nokia’s quarterly numbers – and use that as the catalyst for a b…
…
continue reading

1
Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security
1:33:42
1:33:42
Play later
Play later
Lists
Like
Liked
1:33:42Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national s…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
…
continue reading

1
“I Am Opening a Can of Worms” (Under the Juniper Tree S21E7)
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01Host: Andrew Crowe | Released Thursday, April 24, 2025 This is opening a can of worms. Why? We are discussing the hotly contested subject called autism. In this episode, Andrew discusses the history of autism, some possible reasons why we might be seeing more people diagnosed with it, and looks at the study done by Andrew Wakefield. Episode Resourc…
…
continue reading

1
“I Am Opening a Can of Worms” (Under the Juniper Tree S21E7)
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01Host: Andrew Crowe | Released Thursday, April 24, 2025 This is opening a can of worms. Why? We are discussing the hotly contested subject called autism. In this episode, Andrew discusses the history of autism, some possible reasons why we might be seeing more people diagnosed with it, and looks at the study done by Andrew Wakefield. Episode Resourc…
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
…
continue reading
Send us a text The divide between network engineers and developers has long been a source of frustration, misunderstanding, and blame in the tech world. When applications fail, the classic refrain "it's the network" often echoes through organizations, leaving network engineers scrambling to prove their innocence while developers remain convinced of…
…
continue reading

1
“Samson’s Rule or the Golden Rule” (Authentically Adam S11E8)
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00Host: Wayne Jones | Released Wednesday, April 23, 2025 Understandably, Samson is normally an example of what not to do in leadership. In this weeks’s episode of Authentically Adam, Wayne uses Samson in the usual fashion. Specifically, the discussion centers around Judges 15 and the back-and-forth exchanges of retaliation between Samsons and the Phi…
…
continue reading

1
“The Twelve & The Dead Sea Scrolls” (Inside the Scholar’s Study S5E6)
39:36
39:36
Play later
Play later
Lists
Like
Liked
39:36Hosts: Ed Gallagher and Brad McNutt | Released Wednesday, April 23, 2025 Watch the Video In this episode of Inside the Scholar’s Study, Dr. Gallagher continues discussing the text of the Minor Prophets found at Qumran! We want to hear from you! Subscription LinksBy The Light Network
…
continue reading