show episodes
 
Artwork
 
This is Explain IT, a show for IT professionals by IT professionals; offering insight, knowledge, experience and opinion on a variety of enterprise tech topics. With new episodes out regularly, follow the podcast in your favourite app and you'll get notified with every new release. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Heavy Wireless

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
  continue reading
 
Artwork

1
TechSurge: Deep Tech VC Podcast

Celesta Capital | Deep Tech Venture Capital Firm

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Email feedback and show ideas to [email protected]. Join us as we examine the next major tech cycle, uncover emerging global tech hubs, and analyze where VC investment d ...
  continue reading
 
Artwork
 
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
Artwork

1
5G6G Pulse

Modi Daryani

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to "5G6G Pulse", your ultimate source for everything related to the groundbreaking world of 5G technology. Hosted by Modi Daryani, this podcast delves into the latest advancements, trends, and innovations in 5G, exploring its transformative impact across various industries and everyday life. Each episode of "5G6G Pulse" features in-depth discussions on key topics such as the evolution of mobile networks, the integration of 5G with AI and IoT, the revolutionary potential of autonomous ...
  continue reading
 
We are excited to share our first podcast which is about our company "VMukti Solutions Pvt. Ltd". Our company is a global exporter of innovative solutions, Proven Technology, and Hybrid Solutions for Smart Cities, Healthcare, Education, Vehicle Surveillance, Warehouse surveillance, Election surveillance, Bank surveillance, Examination surveillance, and many more. Our varieties of CCTV camera includes, - WIFI camera: Which is Suitable for Indoor and Outdoor location - 4G Camera: Specially des ...
  continue reading
 
Artwork

1
Meraki Unboxed

Cisco Meraki

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join us as we chat with experts from inside and outside Cisco Meraki. Hear about the latest in technology and the people and culture that drive the business. We’d love to hear your feedback—share it with us at community.meraki.com.
  continue reading
 
Artwork

1
govtech.com Security News Podcast

Ira Victor with Samantha Stone

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
  continue reading
 
Artwork

1
ISU ECpE

Santosh Pandey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the ISU ECpE podcast, from the Iowa State University Department of Electrical and Computer Engineering (ECpE). Here in ECpE, The Future Is What We Do!
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork
 
Take a narrative walk along the education IT journey of fascinating ideas, innovative approaches to trends & challenges and tangible takeaways with Greg Kovich, Global Sales Director for Education at Alcatel-Lucent Enterprise, Don Otto, Director of Network Services for Ridley School District, and their industry-leading guests.
  continue reading
 
Artwork
 
Bite-sized podcast designed for quick consumption. Each episode clocks in under 10 minutes and helps to educate listeners on gadgets, apps, games, and more. An informal and informative approach to cool tech and things we think you'd like, we highlight our favorite things to cross our path. We also like to chat about other non-tech things that we believe you'd love.
  continue reading
 
Loading …
show series
 
In this episode of Hashtag Trending, titled 'The Inflection Point: AI's Gentle Singularity and the Security Conundrum', the hosts grapple with planning their show amidst rapid technological changes and delve into a blog post by Sam Altman on the 'Gentle Singularity.' The discussion touches on concepts from astrophysics and AI, explaining the singul…
  continue reading
 
In this episode of #Trending, hosted by Dr. Hamma sitting in for Jim Love, we explore the longest ChatGPT outage ever, which lasted over 12 hours and exposed our growing dependency on AI. We also discuss Wikipedia's paused AI summary experiment due to negative feedback from editors, and the growing privacy concerns as nearly 15% of 23andMe customer…
  continue reading
 
Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
  continue reading
 
Meta struggles to retain AI talent despite offering substantial salaries, losing experts to companies like OpenAI and Anthropic, which leads with a unique, flexible work culture. Meanwhile, breakthroughs in 3D printing are democratizing robot creation, allowing beginners to build robots for just $500. DeepSeek's GPT-4 level reasoning model can now …
  continue reading
 
Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
  continue reading
 
Today, it is a pleasure to have a special guest, Geir Kjosavik, joining us to discuss precisely why Nordic Semiconductor, a fabless semiconductor company that has a long track record and legacy in designing ultra-low-power wireless solutions, made the move towards power management ICs, or PMICs. The increasing popularity of battery-operated devices…
  continue reading
 
This episode of Hashtag Trending, hosted by Jim Love, covers IBM's plan to deliver the world's first fault-tolerant quantum computer by 2029, significantly advancing quantum computing capabilities. It also discusses Robert F. Smith's stark warning about AI's transformative impact on jobs in the finance sector and beyond. Additionally, the episode e…
  continue reading
 
Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
  continue reading
 
Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electric…
  continue reading
 
A validation survey is typically used for wireless infrastructure post-installation. It compares predictions to real wireless network performance. On today’s show we chat with Joel Crane about validation survey controversies and the challenges of producing a survey whose data has integrity. We cover topics such as the perfectly green heat map, how …
  continue reading
 
In this episode of Hashtag Trending, host Jim Love discusses Meta's potential $10 billion investment in Scale AI, a data annotation company. The investment aims to bolster Meta's AI initiatives and improve training data quality for AI models. Despite controversy over labor practices, Scale AI's revenue is growing rapidly, and it has strong ties wit…
  continue reading
 
OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been obser…
  continue reading
 
In this episode of Hashtag Trending, host Jim Love delves into the tumultuous landscape facing Elon Musk and his companies. Musk's public feud with President Trump has led to a massive 14.3% drop in Tesla's stock, wiping out approximately $152 billion in market value. The fallout extends to regulatory challenges and competition from traditional aut…
  continue reading
 
Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
  continue reading
 
South Bay Mac Users Group Naples Mac User Group Perkins School for the Blind Sindre Sorhus Apps Dato, Aiko and Velja on ScreenCastsONLINE CSUN 2025: Maggie Vision iVR Headset for People with Low Vision Challenging Recording of the Remote Incident Manager for Macstock Support the Show Security Bits — 8 June 2025 — Including VPN Deep Dive Transcript …
  continue reading
 
S2: Episode: 6 In this episode of 5G6G Pulse, we’re taking you on a fascinating journey - from those old rooftop antennas and grainy TV signals during monsoon… all the way to the cutting-edge world of 6G-powered satellite communication. We’ll start by unpacking the vital role LEO (Low Earth Orbit) satellites already play in our lives - from powerin…
  continue reading
 
In this episode of Project Synapse, Jim and Marcel navigate a rapidly evolving AI landscape while John appears intermittently through AI-generated clips, with his permission. They delve into intriguing developments at Google Labs, including a mysterious AI model that briefly appeared and vanished. The discussion highlights the differing ambitions o…
  continue reading
 
In this episode, Dr. Heyman explores several major stories in tech, including Samsung's potential switch from Google's Gemini to Perplexity AI for its Galaxy S26, a gamer's discovery of a counterfeit external hard drive scam, OpenAI's new feature allowing ChatGPT to search user files, and Amazon's humanoid robots poised to revolutionize package del…
  continue reading
 
Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offers malware for download as an update to the Zoom client. https://isc.sans.edu/diary/Be%20Careful%20With%20Fake%20Zoom%20Cl…
  continue reading
 
Will AI displace more jobs than it creates? How can the U.S. win the AI race? How can AI benefits be evenly distributed across businesses and society? We explore these questions and more as Sriram Viswanathan sits down with Ronnie Chatterji, Chief Economist at OpenAI, for an in-depth exploration of AI's economic impact and policy implications. Ronn…
  continue reading
 
In this episode of Hashtag Trending, host Jim Love covers three captivating stories. The first one details Ukraine's daring operation using 20-year-old open source gaming software, ArduPilot, to destroy a third of Russia's strategic bomber fleet. The attack involved 117 drones launched across five Russian air bases, highlighting the unprecedented u…
  continue reading
 
Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
  continue reading
 
In this episode of Trending, host Jim Love discusses several major tech stories. Meta has found a new application for its Metaverse technology through a partnership with defense contractor Andural Industries to develop AI-powered, augmented reality combat helmets for the U.S. military. Apple is rumored to be making its upcoming iPhone 17 Air the fi…
  continue reading
 
vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
  continue reading
 
Microsegmentation divides a network into boundaries or segments to provide fine-grained access control to resources within those segments. On today’s Packet Protector we talk about network and security reasons for employing microsegmentation, different methods (agents, overlays, network controls, and so on), how microsegmentation fits into a zero t…
  continue reading
 
In this episode of Hashtag Trending, host Jim Love discusses NVIDIA CEO Jensen Huang's criticism of US export controls on AI chips that have led to significant financial losses for his company while bolstering Chinese AI competitors like Huawei. NVIDIA faces an $8 billion revenue loss due to restricted H20 chip exports to China. Huang argues that t…
  continue reading
 
Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
  continue reading
 
A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
  continue reading
 
If you'd like to support us with a small donation, go to buymeacoffee.com/techpodcast Deep fakes evolve, and AI detection now struggles to keep up! This video explores the alarming advancements in deep fake technology that allow synthetic videos to mimic even biological signals like heartbeats, making traditional detection tools less effective. Dis…
  continue reading
 
Allison on Double Tap Talking CSUN Using My Elbow to Do a Presentation Over Zoom CSUN 2025: Jamworks AI Notetaking App for Students I Want Feature Parity in Apple Photos Between macOS and iPadOS CSUN 2025: Case For Vision Assistive Devices for People with Vision Loss Support the Show CCATP #814 — Adam Engst on Deep Linking and VPN Survey Transcript…
  continue reading
 
AI, Automation, and the Future of Jobs: A Critical Discussion JOIN OUR DISCORD CHANNEL https://discord.gg/4uwxk6TN6r Support us at: buymeacoffee.com/techpodcast In this episode of Project Synapse's Friday morning coffee chat, the team dives deep into the impact of AI on the job market, sparked by Dario Amodei's candid warning about impending job lo…
  continue reading
 
In this episode of Hashtag Trending, Jim Love discusses several major tech and geopolitical developments. OpenAI co-founder Ilya Sutskever's controversial proposal for a doomsday bunker before achieving artificial general intelligence (AGI) highlights internal conflicts over AI safety. Apple announces a leap from iOS 18 to iOS 26, aligning software…
  continue reading
 
Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
  continue reading
 
In this episode of Hashtag Trending, Jim Love discusses several major tech industry stories. Anthropics CEO Dario Amodei warns that AI could potentially replace large numbers of office jobs within the next few years, potentially leading to high unemployment rates. He emphasizes the need for more awareness and discussion on this pressing issue. Goog…
  continue reading
 
Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
  continue reading
 
Ubiquiti is known primarily for wireless equipment for residential and small business use, but it can be a player in the enterprise world. On today’s show, we talk with Darrell DeRosia, Sr. Director, Network & Infrastructure Services with the Memphis Grizzlies, about how he provides that connectivity for the FedExForum, home to the Memphis Grizzlie…
  continue reading
 
Claude Opus 4 Dominates AI Coding, TELUS Invests Big in AI, Meta's Workforce Optimizations, and SpaceX's Solar Woes In this episode, Jim Love discusses how Claude Opus 4.0 is rapidly becoming the preferred AI tool among software developers, outperforming competitors in handling complex coding tasks. Canada's TELUS announces a substantial $70 billio…
  continue reading
 
SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
  continue reading
 
Aviatrix is a cloud network security company that helps you secure connectivity to and among public and private clouds. On today’s Packet Protector, sponsored by Aviatrix, we get details on how Aviatrix works, and dive into a new feature called the Secure Network Supervisor Agent. This tool uses AI to help you monitor and troubleshoot... Read more …
  continue reading
 
In this episode of Hashtag Trending, host Jim Love discusses China's new $20,000 GR-1 humanoid robot aimed at home use and how it competes with US offerings like Tesla's Optimus. He also covers Anthropic's latest AI model, Claude Opus 4, which showcased manipulative behaviors during a self-preservation test, highlighting the importance of rigorous …
  continue reading
 
Ever wondered how we can stay ahead of cyber threats without burning out? On this edition of Explain IT, we're talking about the leveraging of advanced technology to automatically detect, investigate, and respond to cyber threats, reducing the need for constant human intervention that could lead to burnout. It's all about enhancing efficiency, spee…
  continue reading
 
SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
  continue reading
 
In this episode of Hashtag Trending, guest host Dr. Hema Murti explores the latest in tech predictions and developments, filling in for Jim Love. Dario Amodei from Anthropic predicts the rise of billion-dollar solopreneur businesses by 2026, driven by AI capabilities in areas like writing, coding, and customer support. The episode also covers recen…
  continue reading
 
PBS 180: Theming Jekyll (GitHub Pages) CSUN 2025: Be My Eyes Connects Visually Impaired with Sighted Volunteers What I Wanted from WWDC in 2024 CSUN 2025: Dolphin Computer Access for Visually Impaired SD Card Speeds — How Fast Are They Really? Support the Show Security Bits — 25 May 2025 Transcript of NC_2025_05_25 Join the Conversation: allison@po…
  continue reading
 
S2: Episode: 5 In this deeply personal and forward-looking episode, I reflect on what I observed during a tough 5-month medical journey - and raise one crucial question: Can AI and telecom revolutionize healthcare the way smartphones changed communication? From unnecessary tests and robotic routines to a lack of personalized care, our healthcare sy…
  continue reading
 
JOIN OUR DISCORD CHANNEL https://discord.gg/4uwxk6TN6r Support us at: buymeacoffee.com/techpodcast In this episode of Project Synapse on Hashtag Trending, Jim Love, Marcel Gagne, and John Pinard dive into a week full of remarkable AI advancements and their implications for the job market and future technologies. The discussion kicks off with the ma…
  continue reading
 
Mark Zuckerberg continues to invest heavily in the Metaverse, despite setbacks and a competitive AI landscape. Meta's ambitious goals involve significant capital expenditures and advancements in both hardware and software, although widespread VR adoption remains challenging. Meanwhile, Volvo partners with Google to introduce Gemini AI into its vehi…
  continue reading
 
Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
  continue reading
 
In this episode of TechSurge, host Sriram Viswanathan sits down with Nishant Batra, Chief Strategy and Technology Officer at Nokia, for a deep dive into the evolving landscape of telecom and wireless technology. Nishant shares insights into the seismic shifts transforming network infrastructure—from core networks to edge computing—and discusses how…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play