Weekly conversations about classical music with leading musicians and writers
…
continue reading
We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions
…
continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
continue reading
Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
…
continue reading
This podcast is an extension of the audio league, Exclusive Battle League. We mostly focus on the league and its battlers, along with other things battle rap related.
…
continue reading
Presented by National Debt Relief, a New York Better Business Bureau accredited business, the National Debt Relief podcast shares personal finance insights to help you manage your money wisely. Learn what are the main causes of credit card debt and how to deal with them. You may also laugh with some of our corny jokes about money and famous quotes about money, credit and debt. You'll also learn about the differences between debt consolidation loans, debt negotiation, debt settlement, bankrup ...
…
continue reading

1
Conductor Andris Nelsons on the influence of Shostakovich
36:25
36:25
Play later
Play later
Lists
Like
Liked
36:25This week’s Gramophone podcast is a special focus on one of the most significant of 20th century composers, Dimitri Shostakovich, the 50th anniversary of whose death we mark this year. As our guide to his music we’re privileged to have conductor Andris Nelsons, who, together with the Boston Symphony Orchestra, has just reached the end of a journey …
…
continue reading

1
Brute Force Attacks Unlocked: How Hackers Guess Their Way In
19:18
19:18
Play later
Play later
Lists
Like
Liked
19:18In this episode, we dive deep into the world of brute force attacks—one of the oldest yet still dangerously effective cyberattack methods. We unpack what brute force attacks are, how they work, and the variety of forms they take, from simple password-guessing scripts to sophisticated methods like credential stuffing, hybrid attacks, and rainbow tab…
…
continue reading

1
Dietrich Fischer-Dieskau at 100: Richard Wigmore discusses the great baritone's Winterreise recordings
49:44
49:44
Play later
Play later
Lists
Like
Liked
49:44The German baritone Dietrich Fischer-Dieskau's 100th birthday falls on May 28. One of the most versatile singers of the last century – his operatic repertoire alone ranged from Gluck, Handel and Mozart via Verdi, Wagner and Richard Strauss to Berg, Busoni and Reimann – it's his devotion to song that remains his lasting legacy. To mark the anniversa…
…
continue reading

1
Shadow AI Is Leaking Your Data! [Here’s the Fix]
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17AI apps are inside your org—and leaking your data. In this episode, Microsoft’s David Mine joins us to expose the real-world risks of shadow AI and how Defender for Cloud Apps gives security teams full visibility and control. 🔍 What you’ll learn: How to discover GenAI apps users aren’t declaring Why blocking 1100+ AI tools isn't the answer How to u…
…
continue reading

1
Masaaki and Masato Suzuki on Brahms’s Ein deutsches Requiem
27:38
27:38
Play later
Play later
Lists
Like
Liked
27:38In this week's episode, Editor Martin Cullingford met with the founder and Music Director of Bach Collegium Japan Masaaki Suzuki, along with the group's Principal Conductor Masato Suzuki, to talk about their new recording of Brahms's Ein deutsches Requiem, available now on BIS – as well as discussing Bach's St John Passion, which they had performed…
…
continue reading

1
Pianist Yevgeny Sudbin on returning to Scriabin's music
26:35
26:35
Play later
Play later
Lists
Like
Liked
26:35In 2007, Yevgeny Sudbin released an album of music by Alexander Scriabin. Reviewing it in Gramophone, Bryce Morrison described it as a 'disc in a million'. Now, Sudbin has returned to the composer for his 25th recording for BIS, and offers a wide-ranging survey of music that includes two more of the piano sonatas. James Jolly caught up with Yevgeny…
…
continue reading

1
CEO Feras Tappuni Talks AI, Cloud & SoC Strategy
36:54
36:54
Play later
Play later
Lists
Like
Liked
36:54Running a SoC today isn't about tech—it's about people, risk and scaling in a hyper-complex threat landscape. Learn how the pros do it.In this episode, SecurityHQ CEO reveals:• The real ROI of SoC operations• Why fully automated SoCs are a dangerous myth• How AI and quantum will shape tomorrow’s threats• Scaling from 1 to 500+ SoC staff worldwide• …
…
continue reading

1
Kahchun Wong on The Hallé and Bruckner's Ninth
38:43
38:43
Play later
Play later
Lists
Like
Liked
38:43In this week's episode of the Gramophone Classical Music Podcast, Editor Martin Cullingford is joined by the Principal Conductor of the Hallé Orchestra, Kahchun Wong, to talk about the orchestra's relationship with its home city, Manchester, and their new recording of Bruckner's Symphony No 9.
…
continue reading

1
Cellist Zlatomir Fung on his debut recording of opera fantasies
25:16
25:16
Play later
Play later
Lists
Like
Liked
25:16Zlatomir Fung won the Cello category of the 2019 International Tchaikovsky Competition, and also has an enviable collection of other cello awards and prizes to his name. He was a Borletti-Buitoni Trust Fellowship Winner in 2022 and was awarded an Avery Fisher Career Grant in 2020. His debut recording, ‘Fantasies’, is just out from Signum and on it …
…
continue reading

1
How Microsoft DART Handles Real-World Breaches
33:22
33:22
Play later
Play later
Lists
Like
Liked
33:22Microsoft Entra ID Advisory Service: https://www.threatscape.com/microsoft-entra-id-advisory-service/Shiva P from Microsoft DART walks us through real breach response from the frontlines.🛡️ In this deep dive on Incident Response, you’ll learn:How attackers exploited weak configurationsWhat happens when endpoint protection is disabledThe critical ro…
…
continue reading

1
Conductor Alan Gilbert on Brahms and the NDR Elbphilharmonie Orchestra
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Alan Gilbert is Chief Conductor of the NDR Elbphilharmonie Orchestra, as well as Music Director of the Royal Swedish Opera. Gramophone's James Jolly caught up with him during a run of Wagner’s Die Walküre in Stockholm, where he lives. They talked about his Hamburg-based orchestra, the role today of a radio orchestra and also about the work orchestr…
…
continue reading

1
From 3-2-1 to 4-3-2: How Many Backup Copies Are Enough?
11:13
11:13
Play later
Play later
Lists
Like
Liked
11:13When it comes to protecting your data, not all backup strategies are created equal. In this episode, we dig deep into the evolution of backup best practices — starting with the tried-and-true 3-2-1 method, moving to the more resilient 3-2-1-1-0, and finally unpacking the enterprise-grade 4-3-2 model. We’ll explore why each strategy was created, wha…
…
continue reading

1
XDR vs MDR vs EDR vs NDR – What’s the Right Fit for Your Security Stack?
13:45
13:45
Play later
Play later
Lists
Like
Liked
13:45In this episode, we break down four of the most talked-about cybersecurity technologies—EDR (Endpoint Detection and Response), MDR (Managed Detection and Response), XDR (Extended Detection and Response), and NDR (Network Detection and Response). You’ll learn: How EDR tools provide real-time endpoint visibility and behavioral analytics to detect mal…
…
continue reading

1
StoneFly Secures Veeam Backups & Disaster Recovery: A Game-Changer in Data Protection
22:17
22:17
Play later
Play later
Lists
Like
Liked
22:17In this deep dive episode, we break down the StoneFly DR 365V, an all-in-one backup and disaster recovery solution that addresses data protection, compliance, and scalability. Whether you're a small business or managing enterprise-level data, this episode explores the key features of the DR 365V, including its hardware options, SCVM software, Veeam…
…
continue reading
In this episode, Gramophone's Editor Martin Cullingford talks to pianist Leif Ove Andsnes about his new recording on Sony Classical of the extraordinary work Via Crucis by Franz Liszt, the composer's deeply spiritual meditations on the Stations of the Cross, released just before the start of Holy Week. This week's podcast is produced in association…
…
continue reading

1
Backups, Recovery, and Continuity: Understanding BaaS, RaaS, and DRaaS
11:18
11:18
Play later
Play later
Lists
Like
Liked
11:18Not all data recovery services are created equal. In this episode, we break down the core differences between Backup as a Service (BaaS), Recovery as a Service (RaaS), and Disaster Recovery as a Service (DRaaS)—three acronyms often confused but with radically different capabilities, costs, and outcomes. We use relatable analogies and real-world exa…
…
continue reading

1
Immutable Backups: Your Cyber Insurance Lifeline
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46In this episode, we dive into the growing link between cyber insurance eligibility and immutable backups. As ransomware attacks become more frequent and sophisticated, insurance providers are tightening requirements—and businesses that can’t prove solid data protection may face steep premiums or outright denial of coverage. We explore: The rise in …
…
continue reading

1
From Backups to Real-Time Mirrors: Making Sense of Data Replication Strategies
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04"Replication isn’t just a technical checkbox—it’s your digital insurance policy." In this episode, we dive deep into the four most common data replication methods—array-based, host-based, hypervisor-based, and network-based—and unpack their unique advantages, limitations, and ideal use cases. Whether you’re safeguarding financial data, powering vir…
…
continue reading

1
Jessica Duchen on the life of pianist Myra Hess
30:20
30:20
Play later
Play later
Lists
Like
Liked
30:20This week journalist and author Jessica Duchen joins Holly Baker to talk about her new book Myra Hess - National Treasure, which is out now on Kahn & Averill. Extracts of music on the podcast come from the album 'Myra Hess - The complete solo and concerto studio recordings' on APR Records
…
continue reading

1
Building AI/ML Data Lakes: Why S3 Object Storage Outperforms Traditional Storage
19:45
19:45
Play later
Play later
Lists
Like
Liked
19:45AI and machine learning (ML) demand massive amounts of data, seamless scalability, and high-speed access—which is why traditional storage solutions often fall short. S3 object storage is rapidly becoming the go-to solution for AI/ML data lakes, enabling organizations to handle vast datasets efficiently and cost-effectively. In this episode, we expl…
…
continue reading

1
ESXiArgs Ransomware: A Silent Threat to VMware Servers
17:11
17:11
Play later
Play later
Lists
Like
Liked
17:11The ESXiArgs ransomware attack is a wake-up call for organizations relying on VMware ESXi servers for virtualization. Targeting unpatched and vulnerable systems, this ransomware encrypts virtual machines, leaving businesses locked out of their critical workloads. In this episode, we uncover: 🔹 How ESXiArgs ransomware infiltrates VMware environments…
…
continue reading

1
Medical Data at Risk? How to Store & Protect Patient Records
16:52
16:52
Play later
Play later
Lists
Like
Liked
16:52As hospitals and healthcare providers transition from paper to digital, medical record storage and archiving have become critical challenges. From electronic health records (EHRs) to PACS imaging systems, healthcare organizations must manage massive volumes of sensitive patient data while ensuring compliance with HIPAA and other regulations. In thi…
…
continue reading

1
AI Workloads Demand More—Is Your Storage Ready?
14:40
14:40
Play later
Play later
Lists
Like
Liked
14:40AI workloads are pushing traditional IT infrastructure to its limits. In this episode, we break down how AI storage and servers must evolve to handle massive datasets, high-speed processing, and scalable performance. We’ll explore key challenges like latency, bandwidth, and the role of NVMe SSDs, high-capacity storage tiers, and GPU acceleration. J…
…
continue reading

1
Ransomware vs. Manufacturing: How Ransomware Disrupts Production Lines
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50Manufacturing is under attack. Ransomware is rapidly becoming one of the biggest threats to industrial operations, bringing production lines to a halt, disrupting supply chains, and costing businesses millions in lost revenue. In this episode, we dive into the alarming rise of ransomware in the manufacturing sector, exploring how cybercriminals tar…
…
continue reading

1
Volume Deletion Protection: The Ultimate Fail-Safe for Ransomware, Human Error, and Accidental Deletion
22:19
22:19
Play later
Play later
Lists
Like
Liked
22:19Data loss isn’t always caused by hardware failures—it can happen through accidental deletions, insider threats, and ransomware attacks that target storage volumes. In this episode, we break down Volume Deletion Protection, a critical safeguard that keeps your data intact even when disaster strikes. 🔹 What is Volume Deletion Protection and how does …
…
continue reading

1
James Ehnes on Bach's complete violin concertos
32:42
32:42
Play later
Play later
Lists
Like
Liked
32:42This week violinist James Ehnes joins the Gramophone Podcast to talk about his new recording of Bach's complete violin concertos, recorded with Canada's National Arts Centre Orchestra, and released on the Analeketa label.
…
continue reading

1
Ransomware vs. Healthcare: The Silent Crisis in Hospitals
15:41
15:41
Play later
Play later
Lists
Like
Liked
15:41Hospitals and healthcare providers are on the frontlines of a growing cyber crisis—ransomware attacks that lock down critical systems, disrupt patient care, and put lives at risk. In this episode, we dive into how ransomware is crippling the healthcare industry and what can be done to stop it. 🔹 Why healthcare is one of the biggest targets for cybe…
…
continue reading

1
Education Under Attack: How Schools Can Secure Their Backups
16:45
16:45
Play later
Play later
Lists
Like
Liked
16:45Schools, colleges, and universities are storing more data than ever—from student records and research data to online learning platforms. But with the rise of ransomware, accidental deletions, and system failures, how can educational institutions ensure their data stays safe, accessible, and recoverable? In this episode, we break down the backup and…
…
continue reading

1
How Immutable Snapshots Stop Ransomware Attacks in Their Tracks
24:54
24:54
Play later
Play later
Lists
Like
Liked
24:54Ransomware is evolving, and attackers aren’t just encrypting your files—they’re deleting your backups to leave you with no way out. So, how do you fight back? Immutable snapshots. In this episode, we dive into how immutable snapshots work, why they’re the best defense against ransomware, and how you can set them up on your NAS storage. Unlike tradi…
…
continue reading

1
Backup Defense 101: Stopping Ransomware from Encrypting Your Data
11:51
11:51
Play later
Play later
Lists
Like
Liked
11:51Backups are your last line of defense against ransomware attacks—but what if ransomware can delete them too? Many organizations assume that having backups means they’re safe, but modern ransomware actively targets and destroys backups before demanding a ransom. In this episode, we break down how ransomware finds, encrypts, and deletes backup data, …
…
continue reading

1
Lynx Ransomware: The Stealthy Cyber Threat You Need to Know
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44Ransomware threats are constantly evolving, and Lynx ransomware is one of the latest and most dangerous strains making headlines. But what makes this malware so effective? And how can businesses defend against it? In this episode, we take a deep dive into how Lynx ransomware infiltrates systems, encrypts critical data, and demands hefty ransoms fro…
…
continue reading

1
Beyond Passwords: Why Multi-Factor Authentication is a Must
14:43
14:43
Play later
Play later
Lists
Like
Liked
14:43In today’s digital world, passwords alone aren’t enough to keep cybercriminals out. Multi-Factor Authentication (MFA) has become a critical security measure, adding an extra layer of protection against unauthorized access, data breaches, and identity theft. But how does it really work? And why are some businesses still not using it? In this episode…
…
continue reading

1
Ransomware vs. Finance: How Cybercriminals Target Banks and Institutions
22:16
22:16
Play later
Play later
Lists
Like
Liked
22:16Banks, credit unions, and financial institutions are prime targets for ransomware attacks, with cybercriminals seeking to steal sensitive financial data or hold entire networks hostage for massive payouts. The financial sector faces a relentless wave of cyber extortion, with devastating consequences—including service disruptions, regulatory fines, …
…
continue reading

1
Ransomware as a Service (RaaS): How Hackers Sell Cybercrime
15:52
15:52
Play later
Play later
Lists
Like
Liked
15:52Ransomware is no longer just a tool for elite hackers—it’s now a service for sale on the dark web. Ransomware-as-a-Service (RaaS) has transformed cybercrime, allowing even low-skilled attackers to launch devastating ransomware campaigns against businesses, governments, and individuals. In this episode, we break down how RaaS works—from its subscrip…
…
continue reading

1
When Cars Stop Rolling: The Cost of Ransomware Attacks on Automakers
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16Ransomware attacks are wreaking havoc on the automotive industry, bringing production lines to a grinding halt and costing manufacturers millions in downtime and recovery. But why is this industry such a prime target? In this episode, we break down how ransomware infiltrates automotive supply chains, assembly lines, and dealerships, exposing critic…
…
continue reading

1
LockBit 3.0 & Beyond: The Ransomware Threat That Keeps Evolving
18:08
18:08
Play later
Play later
Lists
Like
Liked
18:08In this episode, we dive deep into LockBit ransomware, a modern cyber threat that’s making headlines worldwide. We’ll explore how LockBit operates—from its initial intrusion methods to the sophisticated encryption techniques it uses to hold organizations hostage. Discover the tactics behind its rapid data encryption, and learn about the double exto…
…
continue reading

1
Inside Conti Ransomware’s Arsenal: Tactics, Techniques, and Threats
19:59
19:59
Play later
Play later
Lists
Like
Liked
19:59In this episode, we dive deep into Conti ransomware, one of today’s most notorious cyber threats. We explore how Conti infiltrates networks, the sophisticated methods it uses to encrypt data, and its infamous double extortion tactics. By breaking down Conti’s technical architecture—from its initial breach and infection strategies to the robust encr…
…
continue reading

1
Dr Nestori Syynimaa on Key Defence Strategies Against Token Theft
32:53
32:53
Play later
Play later
Lists
Like
Liked
32:53🔒 How Attackers Steal Tokens & Bypass MFA – What You Need to Know! Cybercriminals are evolving—and token theft is now one ofthe biggest threats in identity security. In this episode of the Threatscape Podcast, Ru Campbell sits down with Dr Nestori Syynimaa to uncover how attackers steal authentication tokens, bypass MFA, and infiltrate organisation…
…
continue reading

1
AI in 2025: Game-Changing Tools & The Power of StoneFly Appliances
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41AI is evolving faster than ever—are you keeping up? In this episode, we break down the most impactful AI tools of 2025, from text-to-speech advancements to game-changing productivity hacks. Whether you're a creator, entrepreneur, or tech enthusiast, discover how AI can streamline your work, spark creativity, and revolutionize entire industries. Plu…
…
continue reading

1
Remote Access Trojans Exposed: How Hackers Take Control
13:37
13:37
Play later
Play later
Lists
Like
Liked
13:37In this episode, we dive into the world of Remote Access Trojans (RATs) — malicious software that gives cybercriminals stealthy control over your systems. We break down how RATs work, from their initial infection to the way they provide attackers with complete remote access. Drawing from real-world examples and expert analysis, we discuss the tacti…
…
continue reading