…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
1
Healthcare NOW Radio Podcast Network - Discussions on healthcare including technology, innovation, policy, data security, telehealth and more. Visit HealthcareNOWRadio.com
Healthcare NOW Radio and Podcast Network - Radio and Podcasts for the Healthcare Industry
RADIO FOR THE HEALTHCARE INDUSTRY Healthcare NOW Radio and Podcast Network offers discussions on the latest developments and trends impacting the industry including: health tech, health IT, healthcare innovation, healthcare policy, healthcare data security, telehealth, interoperability, biotech, med tech, value-based care, pharma, healthcare compliance, and much more. Shows are hosted by industry thought leaders. Guests are a "who's who" across the healthcare spectrum. The listening audience ...
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
This week, the cybersecurity industry's most basic assumptions under scrutiny. Following up our conversation with Wolfgang Goerlich, where he questions the value of phishing simulations, we discuss essays that call into question: the maturity of the industry the supposed "talent gap" with millions of open jobs despite complaints that this industry …
…
continue reading
Host Gil Bashe and Gregg Masters welcome Stefano Bini, MD., Professor, UCSF, Arthritis & Joint Replacement, Orthopaedic Institute. Dr. Bini curates 'DOCSF' (Digital Orthopaedics Conference San Francisco). They discuss the challenges of implementing transformational change or redesign in U.S. health systems, writ large. Dr. Bini sees overexpressed '…
…
continue reading
1
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More... - SWN #415
34:59
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-415
…
continue reading
Fake GitHub Notices; More Iventi CVS Vulns; Deanonymizing Tor; iPhone Unlockers; Fake GitHub Site Targeting Developers https://isc.sans.edu/diary/Fake%20GitHub%20Site%20Targeting%20Developers/31282 Ivanti CSA 4.6 Advisory https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963?language=en_US Germa…
…
continue reading
1
Speed, Flexibility, and AI: The Case for Migrating from Legacy SOAR Systems - Whitney Young - ESW #376
33:06
In this episode, we explore some compelling reasons for transitioning from traditional SOAR tools to next-generation SOAR platforms. Discover how workflow automation and orchestration offers unparalleled speed and flexibility, allowing organizations to stay ahead of evolving security threats. We also delve into how advancements in AI are driving th…
…
continue reading
1
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More... - SWN #415
34:59
Shroombots, pagers, Tor, Raptor Train, GRU, Blue Light, Aaran Leyland, and More on the Security Weekly News. Show Notes: https://securityweekly.com/swn-415
…
continue reading
1
Back to the office, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland... - SWN #414
34:40
Back to the office serfs, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland, and more on this Edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-414
…
continue reading
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
…
continue reading
1
Do phishing tests do more harm than good? & Speed, Flexibility, and AI - Wolfgang Goerlich, Whitney Young - ESW #376
1:52:31
1:52:31
Αναπαραγωγή αργότερα
Αναπαραγωγή αργότερα
Λίστες
Like
Liked
1:52:31
A month ago, my friend Wolfgang Goerlich posted a hot take on LinkedIn that is less and less of a hot take these days. He posted, "our industry needs to kill the phish test",and I knew we needed to have a chat, ideally captured here on the podcast. I've been on the fence when it comes to phishing simulation, partly because I used to phish people as…
…
continue reading
Host Matt Fisher talks to Daryl Todd, Chief Strategy Officer at Kalderos about the origin and history of 340B program, mechanics of how 340B operates, concerns with deviation from intended benefits, and the opportunity for change through trust.To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healt…
…
continue reading
Gain insights into the CISA KEV straight from one of the folks at CISA, Tod Beardsley, in this episode of Below the Surface. Learn how KEV was created, where the data comes from, and how you should use it in your environment. This segment is sponsored by Eclypsium. Visit https://securityweekly.com/eclypsium to learn more about them! Show Notes: htt…
…
continue reading
1
Exploding Pagers - PSW #843
1:57:38
1:57:38
Αναπαραγωγή αργότερα
Αναπαραγωγή αργότερα
Λίστες
Like
Liked
1:57:38
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
…
continue reading
1
Exploding Pagers - Tod Beardsley - PSW #843
2:53:37
2:53:37
Αναπαραγωγή αργότερα
Αναπαραγωγή αργότερα
Λίστες
Like
Liked
2:53:37
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
…
continue reading
Python Infostealer Targeting Exodus; Service Now KB Leaks; GitLab Patch; Aruba Patch; Python Infostealer Patching Windows Exodus App https://isc.sans.edu/diary/Python%20Infostealer%20Patching%20Windows%20Exodus%20App/31276 Service Now Knoledge Bases Data Exposures https://appomni.com/ao-labs/servicenow-knowledge-bases-data-exposures-uncovered/ Gitl…
…
continue reading
CO 252 Denials: A Growing Challenge and How to Stay AheadUnderstand the growing trend of CO252 denials. Learn what’s driving this surge and Kristeen Coronado’s approach to managing these denials. Brought to you by www.infinx.com.Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at w…
…
continue reading
A takeover of the MOBI TLD for $20, configuring an LLM for a CTF, firmware flaw in an SSD, Microsoft talks kernel resilience, six truths of cyber risk quantification, and more! Show Notes: https://securityweekly.com/asw-299
…
continue reading
Python Exfiltration; VMWare VCenter Patch; macOS Calendar Exploit; 23:59, Time to Exfiltrate! https://isc.sans.edu/diary/23%3A59%2C%20Time%20to%20Exfiltrate!/31272 Critical VMWare VCenter Vulnerability https://blogs.vmware.com/cloud-foundation/2024/09/17/vmsa-2024-0019-questions-answers/ Zero-Click Calendar invite - Critical zero-click vulnerabilit…
…
continue reading
Host Ramesh Kumar sits down with Paul Ashley, CEBS a Vice President and Consultant at NFP. Paul has 22 years of experience managing health plans for upper- to middle-market employers. During the podcast, we talked about the various ways that organizations can improve transparency and reduce their pharmacy costs, as well as examining the latest tren…
…
continue reading
Intentionality in the Workplace: Discussing Workforce Shifts with Inovalon’s Chief People OfficerThe return to in-office work following the COVID-19 pandemic has not been a linear process.Organizations across healthcare and beyond have taken various steps to encourage in-office work, from mandatory requirements to flexible hybrid models. On this ep…
…
continue reading
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
…
continue reading
1
Bringing Secure Coding Concepts to Developers - Dustin Lehr - ASW #299
1:02:26
1:02:26
Αναπαραγωγή αργότερα
Αναπαραγωγή αργότερα
Λίστες
Like
Liked
1:02:26
When a conference positioned as a day of security for developers has to be canceled due to lack of interest from developers, it's important to understand why there was so little interest and why appsec should reconsider its approach to awareness. Dustin Lehr discusses how appsec can better engage and better deliver security concepts in a way that m…
…
continue reading
1
Back to the office, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland... - SWN #414
34:40
Back to the office serfs, Void Banshee, ServiceNow, Taiwan, Dlink, C++, Aaran Leyland, and more on this Edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-414
…
continue reading
1
Solving the Cybersecurity Data Problem - Padraic O'Reilly - BSW #364
1:00:54
1:00:54
Αναπαραγωγή αργότερα
Αναπαραγωγή αργότερα
Λίστες
Like
Liked
1:00:54
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
…
continue reading
1
Consolidating C-Suite Tech Roles as Security Budgets and Workforce Growth Flatline - BSW #364
29:21
In the leadership and communications segment, Why Companies Should Consolidate Tech Roles in the C-Suite, End of an era: Security budget growth slows down, Global cybersecurity workforce growth flatlines, stalling at 5.5M pros, and more! Show Notes: https://securityweekly.com/bsw-364
…
continue reading
PE Overlays; Apple Updates; Ivanti EOL Issue; MSFT Patch Tuesday Revision; DLink Vulns; Managing PE Files with Overlays https://isc.sans.edu/forums/diary/Managing%20PE%20Files%20With%20Overlays/31268/ Apple Updates https://support.apple.com/en-us/100100 Ivanti EOL Cloud Service Appliances https://www.cisa.gov/news-events/alerts/2024/09/13/ivanti-re…
…
continue reading
Host Ericka Adler is joined by fellow Roetzel attorney Christina Kuta to discuss the latest developments in the FTC’s attempt to ban non-competition provisions. Ericka and Christina examine new developments since the previous episode, including a Texas court issuing an injunction preventing the FTC rule from going into effect nationally and the cur…
…
continue reading
121. Enhancing Flexible Endoscope Reprocessing: The Role of Borescopes and AIEvery reprocessing professional that has worked with flexible endoscopes knows one irrefutable fact...Flexible endoscopes are complex devices that are difficult to clean. In this episode, they speak with Harry Oussoren to discuss the importance of tools like borescopes to …
…
continue reading
Leading a Digital Transformation: The Pivot to Digital Care at LifeBridge HealthOn this episode, Chief Information and Digital Officer Tressa Springmann, shares how LifeBridge Health is leading the charge with their digital initiatives with host Ben Hilmes. She highlights real-world examples of how strategic IT alignment can drive better patient ou…
…
continue reading
Pioneering Care Delivery Transformation: Reducing Avoidable Hospitalizations and Driving Value-Based CareHost: Megan AntonelliGuest: Amy BoutwellJoin host Megan Antonelli for an insightful interview with Dr. Amy Boutwell, a leading expert in healthcare delivery transformation. As a practicing physician with deep experience in public policy, process…
…
continue reading
Cybersecurity is complex. We have threats, vulnerabilities, incidents, controls, risks, etc. But how do they all connect together to drive a cyber risk program? As an industry, we've struggled for 20+ years trying to boil this ocean. Maybe we've been going about it the wrong way. Padraic O'Reilly, Founder and Chief Innovation Officer at CyberSaint,…
…
continue reading