show episodes
 
Artwork

1
Firewall

Firewall

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
  continue reading
 
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
HowTo Linux HD

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork
 
In a world marked by wicked social problems, The Minefield helps you negotiate the ethical dilemmas, contradictory claims and unacknowledged complicities of modern life.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Path to Liberty

Tenth Amendment Center

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Every Monday, Wednesday and Friday, Michael Boldin covers the original constitution, principles of the revolution, and strategy – all with an eye on advancing liberty.
  continue reading
 
Artwork
 
A weekly podcast about life, technology, entertainment, and business in general. Things in our focus: deep tech, mental health, community initiatives, artificial intelligence, blockchain, gaming and gambling, esports, augmented reality, virtual reality, marketing, creative thinking, fintech, and many more. The talks are hosted by Zoltan "Hawkie".
  continue reading
 
Artwork
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
Artwork
 
We are TheCyberSoul.io, a podcast and community of tech users in various industries sharing insights to the tech world and discussing real world topics in a hacked up world. We bring together tech enthusiasts from all backgrounds to share their experiences and expertise. Our platform is a place for real conversations about the ever-changing landscape of technology in today's world.
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Artwork

1
tcp.fm

Justin Brodley, Jonathan Baker, Ryan Lucas and Matt Kohn

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Cloud Pod is your one-stop-shop for all things Public, Hybrid, Multi-cloud, and private cloud. Cloud providers continue to accelerate with new features, capabilities, and changes to their APIs. Let Justin, Jonathan, Ryan and Peter help navigate you through this changing cloud landscape via our weekly podcast.
  continue reading
 
Artwork

1
Heavy Networking

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Heavy Networking is an unabashedly nerdy dive into all things networking. Described by one listener as "verbal white papers," the weekly episodes feature network engineers, industry experts, and vendors sharing useful information to keep your professional knowledge sharp and your career growing. Hosts Ethan Banks & Drew Conry-Murray cut through the marketing spin to explore what works—and what doesn't—in networking today, while keeping an eye on what's ahead for the industry. On air since 20 ...
  continue reading
 
Artwork
 
Global Bob who is a cyber security expert and political science hobbyist brings you a show that fuses these topics together to explain in simple terms the interaction between the two. He uses his years of experience in both the government, commercial and private sector to give a unique perspective on these topics.
  continue reading
 
Artwork

1
Global Solo™️ OS

Global Solo™️ OS

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
"The official podcast for the Global Solo™ Operating System. A show for founders, consultants, and creators building a resilient, borderless business of one. We explore the frameworks, tools, and mindset needed to replace operational chaos with cognitive clarity. Hosted by Natalie."
  continue reading
 
Strictly Cyber is your go-to podcast for cutting through the jargon and making cyber security simple, practical and relevant. Whether you’re a business owner, manager or just someone looking to understand how to protect your digital world, we’ve got you covered. Each episode breaks down key cyber security concepts, real-world threats and practical solutions in a clear, approachable way. From certifications like Cyber Essentials to the latest in cyber hygiene and threat prevention, Strictly C ...
  continue reading
 
Presented by Henry K, The #1 Apple Music History Podcast Rootsland is a series that explores the story of two friends who take a musical and spiritual journey from the suburbs of Long Island to the streets of Kingston, Jamaica. Narrated by the man himself, Henry “K” Karyo, Rootsland tells musical stories of landscapes that span styles and genres, and transport the listeners to exotic locations. The story follows Henry, a disillusioned justice major at American University, and Brian, an aspir ...
  continue reading
 
Loading …
show series
 
Two friends decided to turn their shared passion for tennis and food into — well, they don’t know what it could become, but for now it’s a Substack called The Play Boys. Bradley talks to Dave Allee and Paul Tedesco about the best and worst public courts in New York City, why breakfast is more central to their project than lunch or dinner, the surpr…
  continue reading
 
Peter House from Deep Tree talks with Mike Chmielewski about the newest threat firewalls. SonicWall is investigating this after a surge in Akira ransomware attacks targeting its Gen7 firewalls. If you use Gen7 SonicWall, please check or have your IT manager check to ensure SSLVPN is turned off. They also discussed hackers who use a long game compar…
  continue reading
 
It’s early August, which means it’s time for BSides Las Vegas and DEF CON, part of the trio of conferences that make up “hacker summer camp” (the other being Black Hat, which I don’t attend). It’s been a crazy, chaotic week – as usual – but in almost completely good ways. After the regular news, I’ve got some mini interviews with Jake Braun (DEF CO…
  continue reading
 
In this episode, Ryan Williams Sr. and Shannon Tynes discuss the latest trends in cybersecurity, focusing on the implications of AI in vishing attacks, the vulnerabilities in Microsoft Exchange servers, and the ongoing debate about ransomware payments in the public sector. They emphasize the importance of cyber hygiene, patch management, and the ne…
  continue reading
 
"I think the most common thing that I see are payroll or payable scams. That's the most common one I see. Here's an invoice. Click on it and it tries to take you to a fake SharePoint type address where you end up having to put in your Microsoft credentials." Welcome back to the Business and Bytes Podcast! In today’s episode, “Human Firewalls: Why Y…
  continue reading
 
Ransomware. One wrong click, and your financial history and accounts are at the mercy of hackers from anywhere in the world. It happens all the time, and not to just everyday Ohioans. The big payoffs for these cybercriminals are governments. This week Ohio Auditor Keith Faber joins the President's Podcast.He talks about how the new laws his office …
  continue reading
 
While most people ignore the Ninth Amendment, those who don’t usually get it completely wrong. It isn’t a grant of additional federal power; it’s a rule of construction designed to explain its limits. On this episode, we’ll uncover the forgotten history behind the ignored 9th Amendment. Path to Liberty: August 6, 2025 Subscribe: Apple | Spotify | P…
  continue reading
 
Chanel Hit in Salesforce Breach, SonicWall Zero-Day Found, Biggest Crypto Hack Ever 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 956: Today's episode will discuss the latest news as Chanel Hit in Salesforce Breach with more news below: · China Presses NVIDIA Over Alleged Backdoor…
  continue reading
 
After diagnosing the risks in your solo business, what's the cure? It's not a single tool or a simple checklist; it's a completely new way of thinking. In this episode, we reveal the core blueprint of the Global Solo™ Operating System: the META™ framework. Learn to see your business not as a collection of spreadsheets, but as a living organism with…
  continue reading
 
In this powerful episode of TheCyberSoul.io, host Keelin Conant explores the critical role of communication during cyber crises with expert guest Cara Stewart, CEO of Wunder Marx. As ransomware attacks and data breaches become more common, Cara shares why how you communicate is just as important as how you recover. From internal coordination to pub…
  continue reading
 
In a digital age where cyberattacks are common, our spiritual lives also face constant threats from false teaching. Just as we need firewalls to protect our devices, God has given us doctrinal firewalls to safeguard our faith—through biblically qualified elders, sound doctrine, and expositional preaching. In 1 John 4, we’re reminded that the Spirit…
  continue reading
 
Adyen is a global payments processor whose primary business is providing payment services for merchants, retailers, and venues, as well as online payments. On today’s Heavy Networking we talk about a firewall automation project the company has undertaken. With dozens of change requests coming in every day that need to touch network and host firewal…
  continue reading
 
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, l…
  continue reading
 
Please enjoy this encore of Career Notes. Head of Cyber Governance with Red Sift, Dr. Rois Ni Thuama shares the circuitous route of her career into cyber governance. She notes the route "looks really clean, but actually it was a bit more Jeremy Bearimy." While at Trinity College, Rois was moved to be part of history unfolding in South Africa and pa…
  continue reading
 
Bob Rudis, VP Data Science from GreyNoise, is sharing some insights into their work on "Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities." New research reveals a striking trend: in 80% of cases, spikes in malicious activity against enterprise edge technologies like VPNs and firewalls occurred weeks before related CVEs were…
  continue reading
 
Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement…
  continue reading
 
George Mason said the militia consisted of the whole people. Today, that definition has been twisted, ignored, or totally forgotten. Talk about militia and most people will look at you like some kind of fringe nutjob. But the founders saw the militia as a highly armed and trained general population that was essential to the security and liberty of …
  continue reading
 
What do San Francisco, Palo Alto, and Sacramento have to with Ohio? They're home to a radical far-left funded effort to take down Ohio’s surging oil and gas industry. Big donors are funding a little known group of progressive leftists from Athens County that have attempted to generate headlines attacking injection well operations in Southeast Ohio.…
  continue reading
 
LLMs and AI-powered chatbots are becoming a regular feature of network operations tools and vendor product portfolios. Now the next iteration of AI in network ops and automation is likely to be agentic. On today’s Heavy Networking, sponsored by HPE Juniper Networking, we talk about what agentic AI actually means, how AI agents will accomplish... Re…
  continue reading
 
Join host Keelin Conant as she sits down with Kristi Houssiere from Beazley Security for an inside look at the fast-paced, high-stakes world of incident response. From mitigating cyberattacks in real time to safeguarding sensitive industries like healthcare, Kristi offers a wealth of insight into what it takes to respond effectively when the worst …
  continue reading
 
In this Soap Box edition of the Risky Business podcast Patrick Gray chats with Socket founder Feross Aboukhadijeh about how to measure the reachability of vulnerabilities in applications. It’s great to know there’s a CVE in a library you’re using, but it’s even better if you can say whether or not that vulnerability actually impacts your applicatio…
  continue reading
 
SANS Stormcast Friday, August 15th, 2025: Analysing Attack with AI; Proxyware via YouTube; Xerox FreeFlow Vuln; Evaluating Zero Trust @SANS_edu AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed o…
  continue reading
 
A ransomware attack exposes personal medical records of VA patients. New joint guidance from CISA and the NSA emphasizes asset inventory and OT taxonomy. The UK government reportedly spent millions to cover up a data breach. Researchers identified two critical flaws in a widely used print orchestration platform. Phishing attacks increasingly rely o…
  continue reading
 
From being a ROOTCON pioneer and core member (aka GOON) to driving large-scale offensive security operations, Jayson “JV” Vallente has been at the forefront of hacking culture and capability in the Philippines and across APAC. In this live episode from the THEOS Cyber offsite, he joins Paul Jackson to share how he built the country’s first major Ap…
  continue reading
 
🎙️ PA Attorney General Site Down, Russian Hackers Hit Norwegian Dam, Fortinet RCE Exploited 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 962: Today's episode will discuss the latest news as PA Attorney General Site Down with more news below: · Chipmaker Patch Tuesday: Many Vulner…
  continue reading
 
A single frozen payment account can bring a solo business to its knees. The solution isn't just finding a new bank; it's architecting a resilient financial system from the ground up. In this episode, we begin building the first layer of the META™ framework: your Money Flow. We introduce the 3-Layer Banking Stack—a powerful model for structuring you…
  continue reading
 
Welcome to episode 316 of The Cloud Pod, where the forecast is always cloudy! This week we’ve got earnings (with sound effects, obviously) as well as news from DeepSeek, DocumentDB, DigitalOcean, and a bunch of GPU news. Justin and Matt are here to lead you through all of it, so let’s get started! Titles we almost went with this week: Lake Sentinel…
  continue reading
 
SANS Stormcast Thursday, August 14th, 2025: Equation Editor; Kerberos Patch; XZ-Utils Backdoor; ForitSIEM/FortiWeb patches CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer …
  continue reading
 
Patch Tuesday. The Matrix Foundation patches high-severity vulnerabilities in its open-source communications protocol. The “Curly COMrades” Russian-aligned APT targets critical infrastructure. Microsoft tells users to ignore new CertificateServicesClient (CertEnroll) errors. Researchers uncover a malware campaign hiding the NjRat Remote Access Troj…
  continue reading
 
Does the federal government have unilateral power to call forth the militia? During the War of 1812, New England states not only said no, but they used the principles of the 10th Amendment to actively interpose and resist federal demands for mobilizing the militia. Path to Liberty: August 13, 2025 Subscribe: Apple | Spotify | Podbean | Youtube Musi…
  continue reading
 
In March, an ABC Four Corners investigation detailed widespread instances of abuse, injury and neglect in childcare centres across the country. Just a few months later, in a climate of already heightened public awareness and media scrutiny, a series of deeply disturbing allegations came to light of child sex abuse in childcare centres in Victoria, …
  continue reading
 
🎙️ Massive Patch Tuesday Roundup, Allianz Life Data Leaked, K-pop Site Hit Twice by Cyberattacks 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 961: Today's episode will discuss the latest news as Massive Patch Tuesday Roundup with more news below: · Microsoft August 2025 Patch Tue…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: CISA warns about the path from on-prem Exchange to the cloud Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are Everyone and their dog seems to have a shell in US Federal Court information syst…
  continue reading
 
SANS Stormcast Wednesday, August 13th, 2025: Microsoft Patch Tuesday; libarchive vulnerability upgrade; Adobe Patches Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive…
  continue reading
 
Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world’s largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberatta…
  continue reading
 
🎙️ North Korean Kimsuky Hackers Exposed, Minnesota Ransomware Gang ID'd, Citrix NetScaler Exploited 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 960: Today's episode will discuss the latest news as North Korean Kimsuky Hackers Exposed with more news below: · OT Networks Targeted …
  continue reading
 
If Zohran Mamdani stands any chance of succeeding on his social agenda, he'll need a strong economy. Bradley hand-picks the policies and ideas that the likely next mayor of New York City should embrace to drive innovation, attract investment, and create jobs. Growth, he argues, will do the most good for the most New Yorkers. Plus, Bradley reflects …
  continue reading
 
Send us a text From casual pub meetups in London to stadium-sized events and global charity matches, Rasmus Sojmark has redefined what it means to connect an industry. In this episode, we dive into the vision, grit, and game-changing moments that built SBC into “The Greatest Show in Gaming” — and explore how one man turned networking into a global …
  continue reading
 
On this episode, I cover the lackluster launch of GPT-5, a new preview of a Windows 365 Reserve feature, several vulnerability exploits and much more!Reference Links:https://www.rorymon.com/blog/gpt-5-has-arrived-win365-reserve-in-preview-lawsuit-to-try-to-extend-windows-10-support/By Rory Monaghan
  continue reading
 
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto; Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they obs…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play