show episodes
 
Artwork

1
ThreatCast

Threatscape

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
  continue reading
 
Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
  continue reading
 
Artwork

1
National Debt Relief Podcast

National Debt Relief

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Presented by National Debt Relief, a New York Better Business Bureau accredited business, the National Debt Relief podcast shares personal finance insights to help you manage your money wisely. Learn what are the main causes of credit card debt and how to deal with them. You may also laugh with some of our corny jokes about money and famous quotes about money, credit and debt. You'll also learn about the differences between debt consolidation loans, debt negotiation, debt settlement, bankrup ...
  continue reading
 
Loading …
show series
 
This week’s Gramophone podcast is a special focus on one of the most significant of 20th century composers, Dimitri Shostakovich, the 50th anniversary of whose death we mark this year. As our guide to his music we’re privileged to have conductor Andris Nelsons, who, together with the Boston Symphony Orchestra, has just reached the end of a journey …
  continue reading
 
In this episode, we dive deep into the world of brute force attacks—one of the oldest yet still dangerously effective cyberattack methods. We unpack what brute force attacks are, how they work, and the variety of forms they take, from simple password-guessing scripts to sophisticated methods like credential stuffing, hybrid attacks, and rainbow tab…
  continue reading
 
The German baritone Dietrich Fischer-Dieskau's 100th birthday falls on May 28. One of the most versatile singers of the last century – his operatic repertoire alone ranged from Gluck, Handel and Mozart via Verdi, Wagner and Richard Strauss to Berg, Busoni and Reimann – it's his devotion to song that remains his lasting legacy. To mark the anniversa…
  continue reading
 
AI apps are inside your org—and leaking your data. In this episode, Microsoft’s David Mine joins us to expose the real-world risks of shadow AI and how Defender for Cloud Apps gives security teams full visibility and control. 🔍 What you’ll learn: How to discover GenAI apps users aren’t declaring Why blocking 1100+ AI tools isn't the answer How to u…
  continue reading
 
In this week's episode, Editor Martin Cullingford met with the founder and Music Director of Bach Collegium Japan Masaaki Suzuki, along with the group's Principal Conductor Masato Suzuki, to talk about their new recording of Brahms's Ein deutsches Requiem, available now on BIS – as well as discussing Bach's St John Passion, which they had performed…
  continue reading
 
In 2007, Yevgeny Sudbin released an album of music by Alexander Scriabin. Reviewing it in Gramophone, Bryce Morrison described it as a 'disc in a million'. Now, Sudbin has returned to the composer for his 25th recording for BIS, and offers a wide-ranging survey of music that includes two more of the piano sonatas. James Jolly caught up with Yevgeny…
  continue reading
 
Running a SoC today isn't about tech—it's about people, risk and scaling in a hyper-complex threat landscape. Learn how the pros do it.In this episode, SecurityHQ CEO reveals:• The real ROI of SoC operations• Why fully automated SoCs are a dangerous myth• How AI and quantum will shape tomorrow’s threats• Scaling from 1 to 500+ SoC staff worldwide• …
  continue reading
 
Zlatomir Fung won the Cello category of the 2019 International Tchaikovsky Competition, and also has an enviable collection of other cello awards and prizes to his name. He was a Borletti-Buitoni Trust Fellowship Winner in 2022 and was awarded an Avery Fisher Career Grant in 2020. His debut recording, ‘Fantasies’, is just out from Signum and on it …
  continue reading
 
Microsoft Entra ID Advisory Service: https://www.threatscape.com/microsoft-entra-id-advisory-service/Shiva P from Microsoft DART walks us through real breach response from the frontlines.🛡️ In this deep dive on Incident Response, you’ll learn:How attackers exploited weak configurationsWhat happens when endpoint protection is disabledThe critical ro…
  continue reading
 
Alan Gilbert is Chief Conductor of the NDR Elbphilharmonie Orchestra, as well as Music Director of the Royal Swedish Opera. Gramophone's James Jolly caught up with him during a run of Wagner’s Die Walküre in Stockholm, where he lives. They talked about his Hamburg-based orchestra, the role today of a radio orchestra and also about the work orchestr…
  continue reading
 
When it comes to protecting your data, not all backup strategies are created equal. In this episode, we dig deep into the evolution of backup best practices — starting with the tried-and-true 3-2-1 method, moving to the more resilient 3-2-1-1-0, and finally unpacking the enterprise-grade 4-3-2 model. We’ll explore why each strategy was created, wha…
  continue reading
 
In this episode, we break down four of the most talked-about cybersecurity technologies—EDR (Endpoint Detection and Response), MDR (Managed Detection and Response), XDR (Extended Detection and Response), and NDR (Network Detection and Response). You’ll learn: How EDR tools provide real-time endpoint visibility and behavioral analytics to detect mal…
  continue reading
 
In this deep dive episode, we break down the StoneFly DR 365V, an all-in-one backup and disaster recovery solution that addresses data protection, compliance, and scalability. Whether you're a small business or managing enterprise-level data, this episode explores the key features of the DR 365V, including its hardware options, SCVM software, Veeam…
  continue reading
 
In this episode, Gramophone's Editor Martin Cullingford talks to pianist Leif Ove Andsnes about his new recording on Sony Classical of the extraordinary work Via Crucis by Franz Liszt, the composer's deeply spiritual meditations on the Stations of the Cross, released just before the start of Holy Week. This week's podcast is produced in association…
  continue reading
 
Not all data recovery services are created equal. In this episode, we break down the core differences between Backup as a Service (BaaS), Recovery as a Service (RaaS), and Disaster Recovery as a Service (DRaaS)—three acronyms often confused but with radically different capabilities, costs, and outcomes. We use relatable analogies and real-world exa…
  continue reading
 
In this episode, we dive into the growing link between cyber insurance eligibility and immutable backups. As ransomware attacks become more frequent and sophisticated, insurance providers are tightening requirements—and businesses that can’t prove solid data protection may face steep premiums or outright denial of coverage. We explore: The rise in …
  continue reading
 
"Replication isn’t just a technical checkbox—it’s your digital insurance policy." In this episode, we dive deep into the four most common data replication methods—array-based, host-based, hypervisor-based, and network-based—and unpack their unique advantages, limitations, and ideal use cases. Whether you’re safeguarding financial data, powering vir…
  continue reading
 
AI and machine learning (ML) demand massive amounts of data, seamless scalability, and high-speed access—which is why traditional storage solutions often fall short. S3 object storage is rapidly becoming the go-to solution for AI/ML data lakes, enabling organizations to handle vast datasets efficiently and cost-effectively. In this episode, we expl…
  continue reading
 
The ESXiArgs ransomware attack is a wake-up call for organizations relying on VMware ESXi servers for virtualization. Targeting unpatched and vulnerable systems, this ransomware encrypts virtual machines, leaving businesses locked out of their critical workloads. In this episode, we uncover: 🔹 How ESXiArgs ransomware infiltrates VMware environments…
  continue reading
 
As hospitals and healthcare providers transition from paper to digital, medical record storage and archiving have become critical challenges. From electronic health records (EHRs) to PACS imaging systems, healthcare organizations must manage massive volumes of sensitive patient data while ensuring compliance with HIPAA and other regulations. In thi…
  continue reading
 
AI workloads are pushing traditional IT infrastructure to its limits. In this episode, we break down how AI storage and servers must evolve to handle massive datasets, high-speed processing, and scalable performance. We’ll explore key challenges like latency, bandwidth, and the role of NVMe SSDs, high-capacity storage tiers, and GPU acceleration. J…
  continue reading
 
Manufacturing is under attack. Ransomware is rapidly becoming one of the biggest threats to industrial operations, bringing production lines to a halt, disrupting supply chains, and costing businesses millions in lost revenue. In this episode, we dive into the alarming rise of ransomware in the manufacturing sector, exploring how cybercriminals tar…
  continue reading
 
Data loss isn’t always caused by hardware failures—it can happen through accidental deletions, insider threats, and ransomware attacks that target storage volumes. In this episode, we break down Volume Deletion Protection, a critical safeguard that keeps your data intact even when disaster strikes. 🔹 What is Volume Deletion Protection and how does …
  continue reading
 
Hospitals and healthcare providers are on the frontlines of a growing cyber crisis—ransomware attacks that lock down critical systems, disrupt patient care, and put lives at risk. In this episode, we dive into how ransomware is crippling the healthcare industry and what can be done to stop it. 🔹 Why healthcare is one of the biggest targets for cybe…
  continue reading
 
Schools, colleges, and universities are storing more data than ever—from student records and research data to online learning platforms. But with the rise of ransomware, accidental deletions, and system failures, how can educational institutions ensure their data stays safe, accessible, and recoverable? In this episode, we break down the backup and…
  continue reading
 
Ransomware is evolving, and attackers aren’t just encrypting your files—they’re deleting your backups to leave you with no way out. So, how do you fight back? Immutable snapshots. In this episode, we dive into how immutable snapshots work, why they’re the best defense against ransomware, and how you can set them up on your NAS storage. Unlike tradi…
  continue reading
 
Backups are your last line of defense against ransomware attacks—but what if ransomware can delete them too? Many organizations assume that having backups means they’re safe, but modern ransomware actively targets and destroys backups before demanding a ransom. In this episode, we break down how ransomware finds, encrypts, and deletes backup data, …
  continue reading
 
Ransomware threats are constantly evolving, and Lynx ransomware is one of the latest and most dangerous strains making headlines. But what makes this malware so effective? And how can businesses defend against it? In this episode, we take a deep dive into how Lynx ransomware infiltrates systems, encrypts critical data, and demands hefty ransoms fro…
  continue reading
 
In today’s digital world, passwords alone aren’t enough to keep cybercriminals out. Multi-Factor Authentication (MFA) has become a critical security measure, adding an extra layer of protection against unauthorized access, data breaches, and identity theft. But how does it really work? And why are some businesses still not using it? In this episode…
  continue reading
 
Banks, credit unions, and financial institutions are prime targets for ransomware attacks, with cybercriminals seeking to steal sensitive financial data or hold entire networks hostage for massive payouts. The financial sector faces a relentless wave of cyber extortion, with devastating consequences—including service disruptions, regulatory fines, …
  continue reading
 
Ransomware is no longer just a tool for elite hackers—it’s now a service for sale on the dark web. Ransomware-as-a-Service (RaaS) has transformed cybercrime, allowing even low-skilled attackers to launch devastating ransomware campaigns against businesses, governments, and individuals. In this episode, we break down how RaaS works—from its subscrip…
  continue reading
 
Ransomware attacks are wreaking havoc on the automotive industry, bringing production lines to a grinding halt and costing manufacturers millions in downtime and recovery. But why is this industry such a prime target? In this episode, we break down how ransomware infiltrates automotive supply chains, assembly lines, and dealerships, exposing critic…
  continue reading
 
In this episode, we dive deep into LockBit ransomware, a modern cyber threat that’s making headlines worldwide. We’ll explore how LockBit operates—from its initial intrusion methods to the sophisticated encryption techniques it uses to hold organizations hostage. Discover the tactics behind its rapid data encryption, and learn about the double exto…
  continue reading
 
In this episode, we dive deep into Conti ransomware, one of today’s most notorious cyber threats. We explore how Conti infiltrates networks, the sophisticated methods it uses to encrypt data, and its infamous double extortion tactics. By breaking down Conti’s technical architecture—from its initial breach and infection strategies to the robust encr…
  continue reading
 
🔒 How Attackers Steal Tokens & Bypass MFA – What You Need to Know! Cybercriminals are evolving—and token theft is now one ofthe biggest threats in identity security. In this episode of the Threatscape Podcast, Ru Campbell sits down with Dr Nestori Syynimaa to uncover how attackers steal authentication tokens, bypass MFA, and infiltrate organisation…
  continue reading
 
AI is evolving faster than ever—are you keeping up? In this episode, we break down the most impactful AI tools of 2025, from text-to-speech advancements to game-changing productivity hacks. Whether you're a creator, entrepreneur, or tech enthusiast, discover how AI can streamline your work, spark creativity, and revolutionize entire industries. Plu…
  continue reading
 
In this episode, we dive into the world of Remote Access Trojans (RATs) — malicious software that gives cybercriminals stealthy control over your systems. We break down how RATs work, from their initial infection to the way they provide attackers with complete remote access. Drawing from real-world examples and expert analysis, we discuss the tacti…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play