The weekly podcast by technologists, for technologists. Hosted by Cisco Champions.
…
continue reading
Go beyond the network with Cisco IT. Discover the innovation, thought leadership and everyday life of those in Cisco’s enterprise IT organization. Join us as we explore the world of technology, one story at a time.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
The Cisco Podcast Network is a collective of podcasts from across Cisco spanning technology to culture and everything in between. Hear from Cisco customers, partners, and Cisco insiders on the topics that matter most to you. Email us with your feedback and suggestions. Discover your favorite playlists today!
…
continue reading
Network Break keeps you informed with fast, focused analysis of IT news, products, tech trends, and business outcomes. Blending sharp commentary with a touch of humor, hosts Drew Conry-Murray & Johna Till Johnson sift through the weekly landslide of press announcements, product launches, financial reports, and marketing decks to find the stories worth talking about. You come away with the information and context to make smart decisions in your organization and career … all in the span of a ( ...
…
continue reading
Jump-start your use of the Cisco Learning Network's dynamic features and vibrant community offerings. Here you will find technical information and professional networking opportunities, which will help advance your certification goals. By joining the Cisco Learning Network you will be a part of the community, prepare for success, interact with professionals, mentor, share, and achieve.
…
continue reading
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
…
continue reading
Welcome to the inside track of cybersecurity entrepreneurship. We bring you the best founders, operators, and investors building the future of cybersecurity.
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Podcast by Cisco
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Listen in on discussions with Cisco and industry experts regarding business, design, and deployment considerations of SSL VPN in focused 10-15 minute topics. This will be a series of seven discussions, occurring once monthly.
…
continue reading
How does technology influence our lives, work and relationships? Join Cisco co-hosts Collette and Rosie as they embrace a balanced life in the tech world and interview inspiring guests. Disclaimer: We like things explained simple. We’ll take the tech acronyms out and put the fun in.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Welcome to Ventev's podcast! Here you can listen to industry and subject matter experts share their knowledge and experiences around wireless network deployment, interoperability with leading network manufacturers, innovative solutions from Ventev, and much more. Hosted by master podcaster, Jonathan Davy, and industry expert, Jared VanAllen, in the United States, follow our podcast for the latest episodes twice a month!
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
…
continue reading
Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
…
continue reading
XenTegra podcasts are about Citrix, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via Citrix Workspace with Intelligence. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
…
continue reading
XenTegra podcasts are about VMware, Microsoft, Azure, IGEL, Nutanix, Ivanti, Google, PrinterLogic, Cisco, NVIDIA, ControlUp, Login VSI, and other key partners to make 'end-user computing' environments accessible from anywhere, securely with a single identity via VMware Workspace ONE. We make enterprise digital transformation a reality! XenTegra, we are the experts in digital workspace technologies and cloud infrastructure.
…
continue reading

1
Inside Outside Innovation
Brian Ardinger, Founder of Inside Outside Innovation podcast, InsideOutside.io, and the Inside Outside Innovation Summit
Inside Outside Innovation explores the ins and outs of innovation with raw stories, real insights, and tactical advice from the best and brightest in startups & corporate innovation. Each week we bring you the latest thinking on talent, technology, and the future of innovation. Join our community of movers, shakers, makers, founders, builders, and creators to help speed up your knowledge, skills, and network. Previous guests include thought leaders such as Brad Feld, Arlan Hamilton, Jason Ca ...
…
continue reading
Home of the Cloud Unfiltered Podcast cloudunfiltered.substack.com
…
continue reading
Watch Nationally Syndicated Car Concerns USA Radio Show Every Week-day Morning Starting at 9:00 A.M. (EST). USA TOLL-FREE: 1-855-CAR-CONCERNS (855-227-2662) @ http://bit.ly/cwAyD7 Car Concerns Is The Fastest Growing Car Talk Radio Show In The USA! Car Concerns is Nationally Syndicated Radio Talk Show That is Heard In Great USA Radio Markets Like Boston, Chicago, Las Vegas, Pittsburgh, Winter Springs, Botell, Hagatna and Other Great Cities Around The Nation. Is Car Concerns Heard In Your Town ...
…
continue reading

1
S6 E4: Talking Creativity, AI, and the future of IT with Fletcher Previn
13:29
13:29
Play later
Play later
Lists
Like
Liked
13:29AB sits down with Cisco’s CIO, Fletcher Previn, to talk about the role IT plays in driving business success. Fletcher shares his thoughts on the skills needed for the future of IT, how AI can enhance human potential, and why individual creativity can drive even better IT experiences and outcomesBy Cisco
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities (#)
8:52
8:52
Play later
Play later
Lists
Like
Liked
8:52SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people’s credentials. https://isc.…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC (#)
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows’ System Resource Usage Monitor (SRUM). This database logs how much resources software used…
…
continue reading

1
NB524: Forward Networks Adds Endpoint Discovery; Intel Forecasts Q2 Layoffs
24:10
24:10
Play later
Play later
Lists
Like
Liked
24:10Take a Network Break! We start with a Red Alert for SAP NetWeaver’s Visual Composer Metadata Uploader, and then dive into a new endpoint discovery feature from Forward Networks, and Ericsson adding clientless ZTNA to its SASE offering. Aviatrix adds a Secure NAT Gateway for Microsoft Azure as a way to help Azure customers navigate... Read more »…
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
…
continue reading

1
SANS Stormcast Monday, April 27th: Image Steganography; SAP Netweaver Exploited (#)
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56SANS Stormcast Monday, April 27th: Image Steganography; SAP Netweaver Exploited Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use…
…
continue reading

1
Troubleshooting Tips & Outages at Zoom, Spotify & More
16:40
16:40
Play later
Play later
Lists
Like
Liked
16:40Dive into recent service disruptions at Zoom, Spotify, SAP Concur, and Vanguard UK, and explore what they reveal about troubleshooting best practices for ITOps teams.Tune in now for insights from The Internet Report team or use the chapters below to jump to the sections that most interest you.CHAPTERS:00:00 Intro00:52 Zoom Outage04:40 SAP Concur Di…
…
continue reading

1
Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
…
continue reading

1
TNO026: Gain Confidence in AI for NetOps with Juniper Networks (Sponsored)
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58Confidence in a new technology is one of the greatest barriers to adoption of that technology. If you don’t believe it will improve your NetOps, why would you adopt it? This is especially true of AI products. On today’s show, we’re joined by Bob Friday, Chief AI Officer of Mist/Juniper to make the case for... Read more »…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues; (#)
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues; Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Tel…
…
continue reading

1
Hacking Crosswalks and Attacking Boilers - PSW #871
2:04:15
2:04:15
Play later
Play later
Lists
Like
Liked
2:04:15The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
…
continue reading

1
404 Script Not Found: Gaslighting LinkedIn
21:11
21:11
Play later
Play later
Lists
Like
Liked
21:11Kat is back from her wedding, and everyone is circling back with her, which begs the question: do you reply to sales reps who slide into your LinkedIn DMs? What about cold emails?Ian shares a tip to help filter out spam on LinkedIn, and maybe even make your profile more memorable. We then try to figure out how spam filters work before coming up wit…
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco (#)
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP addr…
…
continue reading
Send us a text The divide between network engineers and developers has long been a source of frustration, misunderstanding, and blame in the tech world. When applications fail, the classic refrain "it's the network" often echoes through organizations, leaving network engineers scrambling to prove their innocence while developers remain convinced of…
…
continue reading

1
ISO 42001 Certification, CIOs Struggle to Align Strategies, and CISOs Rethink Hiring - Martin Tschammer - BSW #392
1:03:55
1:03:55
Play later
Play later
Lists
Like
Liked
1:03:55AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
…
continue reading

1
SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
…
continue reading

1
Brains, Elusive Comet, AI Scams, Microsoft Dog Food, Deleting Yourself, Josh Marpet - SWN #470
31:59
31:59
Play later
Play later
Lists
Like
Liked
31:59Brains, Scams, Elusive Comet, AI Scams, Microsoft Dog Food, Deleting Yourself, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-470
…
continue reading

1
SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed (#)
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A…
…
continue reading

1
PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
…
continue reading

1
Managing Secrets - Vlad Matsiiako - ASW #327
1:03:03
1:03:03
Play later
Play later
Lists
Like
Liked
1:03:03Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
…
continue reading

1
SANS Stormcast Tuesday, April 22nd: Phishing via Google; ChatGPT Fingerprint; Asus AI Cloud Vuln; PyTorch RCE
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
…
continue reading

1
SANS Stormcast Tuesday, April 22nd: Phishing via Google; ChatGPT Fingerprint; Asus AI Cloud Vuln; PyTorch RCE (#)
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35SANS Stormcast Tuesday, April 22nd: Phishing via Google; ChatGPT Fingerprint; Asus AI Cloud Vuln; PyTorch RCE It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google’s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing…
…
continue reading

1
Citrix + NVIDIA: AI Virtual Workstations Are Here
28:19
28:19
Play later
Play later
Lists
Like
Liked
28:19In this episode of The Citrix Session, host Bill Sutton is joined by Todd Smith, recently promoted Senior Manager for Account Technology Strategists (ATS) in the public sector at Citrix. Together, they dive into a pivotal blog article released at Citrix UNITE in New Orleans—“Citrix and NVIDIA Partner to Deliver AI Virtual Workstations.” What’s Insi…
…
continue reading

1
NB523: CVE’s Reprieve, Google WAN For Sale, NVIDIA Pledges More US-Made Chips
49:46
49:46
Play later
Play later
Lists
Like
Liked
49:46Take a Network Break! We start with a red alert for the CVE program, which nearly lost government funding before CISA stepped in, and then raise an alert for a Dpanel vulnerability. Google makes its Cloud WAN available to enterprises and governments that want connectivity options, a US District Court rules Google’s ad business a... Read more »…
…
continue reading

1
The past, present, and future of enterprise AI - Matthew Toussain, Pravi Devineni - ESW #403
2:11:51
2:11:51
Play later
Play later
Lists
Like
Liked
2:11:51In this interview, we're excited to speak with Pravi Devineni, who was into AI before it was insane. Pravi has a PhD in AI and remembers the days when machine learning (ML) and AI were synonymous. This is where we'll start our conversation: trying to get some perspective around how generative AI has changed the overall landscape of AI in the enterp…
…
continue reading

1
SANS Stormcast Monday, April 21st: MSFT Entra Lockouts; Erlang/OTP SSH Exploit; Sonicwall Exploit; bubble.io bug
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
…
continue reading

1
ANS Stormcast Monday, April 21st: MSFT Entra Lockouts; Erlang/OTP SSH Exploit; Sonicwall Exploit; bubble.io bug (#)
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31ANS Stormcast Monday, April 21st: MSFT Entra Lockouts; Erlang/OTP SSH Exploit; Sonicwall Exploit; bubble.io bug Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft be…
…
continue reading