show episodes
 
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
The Agency Uplift Podcast: Agency Scaling Strategies & Growth Tips Unlock proven frameworks, AI‑powered workflows, and client acquisition blueprints to scale your digital agency from freelance to Fortune. Each week, host Sean Lang, co‑founder of Social Commerce Club and agency growth coach, sits down with a wide array of agency leaders—sharing battle‑tested tactics on profitability, processes, and people management. Whether you’re aiming to double client retention, streamline operations, or ...
  continue reading
 
Artwork

1
Soul Soiree

The Daisy Patch

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Soul Soiree is a weekly podcast hosted by Danielle Brooker, from The Daisy Patch, which helps people who are stuck—wanting to reclaim their lives from ‘busy’ and reconnect with themselves. This podcast is a celebration of bringing out more of ourselves. We share tips and insights to reconnect to your inner spark & interviews Soulful Inspirers who are creating more of what they want in their lives – all so you too can embrace and live your life more fully. This is about balance, wellness, not ...
  continue reading
 
Artwork

1
That's Theatre Darling

thatstheatredarling

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
That's Theatre Darling is a podcast celebrating theatre in all it's glory. I'll be joined by a whole host of inspiring guests, each with a story to tell about their life, career and an abundance of theatrical anecdotes. -Music kindly provided by the wonderful Patch and The Giant. Find more of their music at https://www.patchandthegiant.com/ [Track: Patch and The Giant - The Sleeping Boat] Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
  continue reading
 
Artwork

1
Anesthesiology News Presents

Anesthesiology News, James Prudden, Paul Bufano

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Anesthesiology News will be publishing a new season of our popular podcast series, “On the Case” and “Ask the Experts.” “On the Case” is a review series that features the authors of our popular case report series. We hear the behind-the-scenes story on the most unique clinical case studies published in the magazine directly from the professionals who managed them. The first episode of this new season features an interview with L. Jane Stewart, MD, JD, MPH, who co-wrote a case report about a ...
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork
 
This show interviews the “smart money” (large money managers & CEOs) for timeless investing advice. My goal is to provide you with timeless/actionable advice that you can use to make smarter investment decisions, and help you become intellectually wealthy. The Host: Adam Sarhan, Author, Investor, and Forbes Contributor, interviews real money managers with over $100 million in assets under management (AUM) and CEOs for timeless advice. Disclaimer: All our work is general in nature and for edu ...
  continue reading
 
Welcome to the Flexera Security Vulnerability Insight Podcast, your go-to source for all things related to cybersecurity, software vulnerabilities, and threat intelligence. In this engaging podcast series, we will dive deep into the ever-evolving world of digital security, providing you with valuable insights, expert interviews, and the latest industry trends. Hosted by Jeroen Braak and leading experts in the field, each episode explores critical topics such as: Vulnerability Management: Sta ...
  continue reading
 
We have plenty of people within Foundation IT that like to talk and like to talk technology. What better way to share our knowledge, our frustrations and our thoughts for the future than via a podcast. Technology, specifically IT infrastructure, remains under invested in; whilst as a nation we responded brilliantly to the pandemic in terms of homeworking, many businesses cobbled something together and made do. With a mixture of podcast guests we’ll be tackling some of the technology challeng ...
  continue reading
 
Welcome to the Backend Engineering Show podcast with your host Hussein Nasser. If you like software engineering you’ve come to the right place. I discuss all sorts of software engineering technologies and news with specific focus on the backend. All opinions are my own. Most of my content in the podcast is an audio version of videos I post on my youtube channel here http://www.youtube.com/c/HusseinNasser-software-engineering Buy me a coffee https://www.buymeacoffee.com/hnasr 🧑‍🏫 Courses I Te ...
  continue reading
 
Artwork
 
The Self Mastery Show documents the journey of internet-entrepreneur, David Wong on the path towards becoming the best version of himself. Join us in discovering your potential and definition of self mastery. David shares the lessons, struggles and feelings along his journey and also interviews like-minded individuals, thought leaders and influential celebrities to share their story. The Self Mastery Show is for you whether you're going through a bit of a rough patch in life or are already l ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Downtime Procedures

Rich Kenny, Dan Weberg

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Downtime Procedures is the podcast where healthcare innovation meets human ingenuity. Hosted by Rich G. Kenny, Chief Clinical Officer at Veritas Labs, and Dr. Dan Weberg, a healthcare leader with expertise in innovation and transformation, this show dives into the real stories behind healthcare’s operational challenges. Each week features candid conversations with executives, frontline leaders, and innovators tackling everything from workforce transformation to crisis management. Hear how sy ...
  continue reading
 
The Shift is a regular podcast series produced by DemandFarm that brings strategic sales and account management leaders from global companies, as guests, to share their stories & experiences about the transition to digital Key Account Management. Increasingly, as customers prefer their B2B Sales interactions to remain virtual, Key Account Management has also shifted towards a virtual direction where technology comes to the forefront as a key differentiator and enabler. Account Managers and S ...
  continue reading
 
Artwork

1
The Hormone Solution with Karen Martel

Karen Martel Hormone Specialist

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The Hormone Solutions Podcast with Karen Martel is your ultimate guide to understanding the complexities of hormone health, hormone replacement therapy (HRT), and optimizing your health in midlife. Hosted by Karen Martel, known as the “Hormone Whisperer,” this podcast taps into her deep understanding of hormones—something that sets her apart from most practitioners. As a Certified Hormone Specialist, Transformational Nutrition Coach, speaker, podcaster, and passionate advocate for women’s he ...
  continue reading
 
Artwork

1
The CyberDap Podcast

Daniel Agyemang Prempeh - TheCyberDap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
  continue reading
 
Artwork
 
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep ​network visibility to not only protect against sophisticated cyber- ...
  continue reading
 
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
Artwork

1
Solving Climate, Naturally

Solving Climate, Naturally

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We are a show about nature’s role in tackling climate change. A new industry is taking shape, and our goal is to host a candid, cross-disciplinary conversation on nature and its role in addressing climate change. We are three friends with diverse backgrounds who met in business school at Stanford and share a common interest in demystifying natural climate solutions. Together, we’ll unpack this growing field and connect the dots across the people and ideas shaping its future. Whether you work ...
  continue reading
 
Loading …
show series
 
Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on …
  continue reading
 
Get ready for another insightful Q&A episode featuring your questions! Curious about hormone health and its impact on your well-being? Ever wondered why testosterone cream might cause pesky side effects like acne or hair growth? We discuss potential solutions and alternatives to consider. Struggling with weight gain or stubborn weight loss during m…
  continue reading
 
Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the M…
  continue reading
 
An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian inform…
  continue reading
 
Key Takeaways Implementing Profit First creates essential financial clarity and structure Separate your revenue into 4 simple accounts: OpEx, Owner’s Comp, Taxes, and Profit Most agency owners unknowingly overspend and underpay themselves Tracking profitability per client reveals which clients are profitable vs. loss-making Use a basic Google Sheet…
  continue reading
 
How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
  continue reading
 
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.s…
  continue reading
 
We put together an open conversation between our podcast hosts, CyberWire Daily's Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Their conversation goes deeper than just the historical significance of Juneteenth, diving into candid conversations on allyship, representation, and the enduring value of d…
  continue reading
 
Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie In…
  continue reading
 
Key Takeaways Chase transitioned from music and photography into digital freelancing before co-founding Electric Eye. The agency became “real” after three years, shaped by key books like Built to Sell, Profit First, and Traction. Niching down into Shopify design and development significantly improved operations, profitability, and client fit. Partn…
  continue reading
 
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs. North Korea’s …
  continue reading
 
This $450M Money Manager Uses Stocks & Options To Gain An Edge In The Market - Meet Paul S. Stanley Managing Partner At Granite Bay Wealth Management Guest: Paul S. Stanley, CFP®, CPM® Managing Partner At Granite Bay Wealth Management $450M AUM Website: https://granitebaywm.com/ Bio: Paul graduated from Bentley College with a Bachelor’s in Economic…
  continue reading
 
Welcome to Quick Hits: Blasts from The Past. Join Karen as she explores her podcast archives, offering you short, impactful excerpts from standout episodes. In just 15 minutes, you'll experience the essence of past conversations, packed with valuable insights and memorable moments from our guests. If you want to dive deeper, you'll find links to th…
  continue reading
 
Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple device…
  continue reading
 
Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
  continue reading
 
Description: In this episode, Johnson Investment Counsel’s managing director Chad Maggard joins Adam in a conversation about getting started in wealth management, a snapshot of the industry today and strategies for navigating tough client conversations. Chad shares his perspective on building trust, addressing client concerns and delivering value —…
  continue reading
 
Key Takeaways Ale started his career as an engineer and later transitioned into marketing with a data-driven mindset. Orkesta specializes in helping eCommerce and SaaS companies with performance marketing and full-funnel strategy. The agency has evolved to include creative services, video content, and AI integration to stay competitive. AI is viewe…
  continue reading
 
SANS Stormcast Monday, June 16th, 2025: Extracing Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider b…
  continue reading
 
International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign…
  continue reading
 
Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is bei…
  continue reading
 
On this episode, I provide an update on the recent Windows updates and report of an issue caused by one of the updates. I cover some new enhancements from OpenAI, the culmination of a 4 year study into remote work and more!Reference Links:https://www.rorymon.com/blog/microsoft-365-authentication-issues-danish-agency-to-ditch-office-june-update-issu…
  continue reading
 
SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://…
  continue reading
 
Please enjoy this encore of Career Notes. Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to…
  continue reading
 
Curious about how estrogen affects your joint health during menopause? Ever wondered if there's a link between biohacking and managing osteoarthritis? In this episode, join us as we delve into the world of peptides and surgery recovery with Zora Benhamou, a gerontologist and healthy aging coach. Discover how you can empower yourself with practical …
  continue reading
 
This week, Dave is joined by ⁠Ziv Karliner⁠, ⁠Pillar Security⁠’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how e…
  continue reading
 
Cloudflare says yesterday’s widespread outage was not caused by a cyberattack. Predator mobile spyware remains highly active. Microsoft is investigating ongoing Microsoft 365 authentication services issues. An account takeover campaign targets Entra ID users by abusing a popular pen testing tool. Palo Alto Networks documents a JavaScript obfuscatio…
  continue reading
 
Key Takeaways Client churn often feels sudden but usually stems from deeper issues than just performance. Reacting to churn with more sales efforts alone treats the symptom, not the cause. Real solutions come from diagnosing and addressing foundational operational and leadership gaps. Agencies must assess fit and alignment with their ICP before onb…
  continue reading
 
Fundamentals of Operating Systems Course https://oscourse.winktls is brilliant.TLS encryption/decryption often happens in userland. While TCP lives in the kernel. With ktls, userland can hand the keys to the kernel and the kernel does crypto. When calling write, the kernel encrypts the packet and send it to the NIC.When calling read, the kernel dec…
  continue reading
 
Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
  continue reading
 
SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln; Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copi…
  continue reading
 
Interpol’s Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of P…
  continue reading
 
Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
  continue reading
 
On this episode, I talk about a worrying job forecast for IT Pros, several consumer side announcements from Apple and Microsoft, Patch Tuesday news and much more!Reference Links:https://www.rorymon.com/blog/apple-announcements-from-wwdc-patch-tuesday-news-grim-job-forecast-for-it-pros/By Rory Monaghan
  continue reading
 
SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu…
  continue reading
 
Patch Tuesday. Mozilla patches two critical FireFox security flaws. A critical flaw in Salesforce OmniStudio exposes sensitive customer data stored in plain text. The Badbox botnet continues to evolve. AI-powered “ghost students” enrolling in online college courses to steal government funds. Hackers steal nearly 300,000 vehicle crash reports from t…
  continue reading
 
Key Takeaways Pasha’s agency journey started as a side hustle while bootstrapping his own Amazon brand. AMZ Optimized helps FBA sellers scale faster and more cost-effectively than hiring in-house. The human relationship element is essential to long-term agency success—automation alone can’t replace it. Applying principles from permaculture, Pasha b…
  continue reading
 
Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
  continue reading
 
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/dia…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play